Preferred Language
Articles
/
JReZNI8BVTCNdQwCymEd
A binary Particle Swarm Optimization for attacking knapsacks Cipher Algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Aug 01 2008
Journal Name
2008 First International Conference On The Applications Of Digital Information And Web Technologies (icadiwt)
Hybrid canonical genetic algorithm and steepest descent algorithm for optimizing likelihood estimators of ARMA (1, 1) model
...Show More Authors

This paper presents a hybrid genetic algorithm (hGA) for optimizing the maximum likelihood function ln(L(phi(1),theta(1)))of the mixed model ARMA(1,1). The presented hybrid genetic algorithm (hGA) couples two processes: the canonical genetic algorithm (cGA) composed of three main steps: selection, local recombination and mutation, with the local search algorithm represent by steepest descent algorithm (sDA) which is defined by three basic parameters: frequency, probability, and number of local search iterations. The experimental design is based on simulating the cGA, hGA, and sDA algorithms with different values of model parameters, and sample size(n). The study contains comparison among these algorithms depending on MSE value. One can conc

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Collapse Pattern in Gypseous Soil using Particle Image Velocimetry
...Show More Authors
Abstract<p>Gypseous soil is prevalent in arid and semi-arid areas, is from collapsible soil, which contains the mineral gypsum, and has variable properties, including moisture-induced volume changes and solubility. Construction on these soils necessitates meticulous assessment and unique designs due to the possibility of foundation damage from soil collapse. The stability and durability of structures situated on gypseous soils necessitate close collaboration with specialists and careful, methodical preparation. It had not been done to find the pattern of failure in the micromechanical behavior of gypseous sandy soil through particle image velocity (PIV) analysis. This adopted recently in geotech</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Symmetric and Positive Definite Broyden Update for Unconstrained Optimization
...Show More Authors

Broyden update is one of the one-rank updates which solves the unconstrained optimization problem but this update does not guarantee the positive definite and the symmetric property of Hessian matrix.

In this paper the guarantee of positive definite and symmetric property for the Hessian matrix will be established by updating the vector  which represents the difference between the next gradient and the current gradient of the objective function assumed to be twice continuous and differentiable .Numerical results are reported to compare the proposed method with the Broyden method under standard problems.

View Publication Preview PDF
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jun 13 2012
Journal Name
Journal Of Kerbala University
Thermo physical behaviour of binary and ternary systems for cyclohexanol with some Ketones at three temperature
...Show More Authors

Publication Date
Thu Jul 04 2024
Journal Name
Pharmaceutics
Formulation Development of Meloxicam Binary Ethosomal Hydrogel for Topical Delivery: In Vitro and In Vivo Assessment
...Show More Authors

Abstract: The article aimed to formulate an MLX binary ethosome hydrogel for topical delivery to escalate MLX solubility, facilitate dermal permeation, avoid systemic adverse events, and compare the permeation flux and efficacy with the classical type. MLX ethosomes were prepared using the hot method according to the Box–Behnken experimental design. The formulation was implemented according to 16 design formulas with four center points. Independent variables were (soya lecithin, ethanol, and propylene glycol concentrations) and dependent variables (vesicle size, dispersity index, encapsulation efficiency, and zeta potential). The design suggested the optimized formula (MLX−Ethos−OF) with the highest desirability to perform the

... Show More
Preview PDF
Scopus (13)
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Nanotechnology, Science And Applications
Formulation and Characterization of Intranasal Drug Delivery of Frovatriptan-Loaded Binary Ethosomes Gel for Brain Targeting
...Show More Authors

Background: Frovatriptan succinate (FVT) is an effective medication used to treat migraines; however, available oral formulations suffer from low permeability; accordingly, several formulations of FVT were prepared. Objective: Prepare, optimize, and evaluate FVT-BE formulation to develop enhanced intranasal binary nano-ethosome gel. Methods: Binary ethosomes were prepared using different concentrations of phospholipid PLH90, ethanol, propylene glycol, and cholesterol by thin film hydration and characterized by particle size, zeta potential, and entrapment efficiency. Furthermore, in-vitro, in-vivo, ex-vivo, pharmacokinetics, and histopathological studies were done. Results: Regarding FVT-loaded BE, formula (F9) demonstrated the best paramet

... Show More
View Publication
Scopus (30)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Engineering
Software Implementation of Binary BCH Decoder Using Microcontroller
...Show More Authors

In this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.

 

 

View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF