Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreFuzzy numbers are used in various fields such as fuzzy process methods, decision control theory, problems involving decision making, and systematic reasoning. Fuzzy systems, including fuzzy set theory. In this paper, pentagonal fuzzy variables (PFV) are used to formulate linear programming problems (LPP). Here, we will concentrate on an approach to addressing these issues that uses the simplex technique (SM). Linear programming problems (LPP) and linear programming problems (LPP) with pentagonal fuzzy numbers (PFN) are the two basic categories into which we divide these issues. The focus of this paper is to find the optimal solution (OS) for LPP with PFN on the objective function (OF) and right-hand side. New ranking f
... Show MoreThis research Sought to identify the correlation relationships and the impact of each of the job description and perceived organizational support, Excellent Job performance of the heads of academic departments in the faculties of the University of Sulaymaniyah Iraqi Kurdistan Region, totaling (89) as President, and to achieve this was Default plan includes research variables as well as the formulation of a number of preparation fundamental assumptions, and researchers used a questionnaire for this purpose as a tool head of the collection of data and information, as it was distributed (80) copies, and the number of retrieved them (76) a copy of a valid statistical analysis, as well as conducting personal i
... Show MoreThe current issues in spam email detection systems are directly related to spam email classification's low accuracy and feature selection's high dimensionality. However, in machine learning (ML), feature selection (FS) as a global optimization strategy reduces data redundancy and produces a collection of precise and acceptable outcomes. A black hole algorithm-based FS algorithm is suggested in this paper for reducing the dimensionality of features and improving the accuracy of spam email classification. Each star's features are represented in binary form, with the features being transformed to binary using a sigmoid function. The proposed Binary Black Hole Algorithm (BBH) searches the feature space for the best feature subsets,
... Show MoreThe aim of this paper is to study the quaternary classical continuous optimal control for a quaternary linear parabolic boundary value problems(QLPBVPs). The existence and uniqueness theorem of the continuous quaternary state vector solution for the weak form of the QLPBVPs with given quaternary classical continuous control vector (QCCCV) is stated and proved via the Galerkin Method. In addition, the existence theorem of a quaternary classical continuous optimal control vector governinig by the QLPBVPs is stated and demonstrated. The Fréchet derivative for the cost function is derived. Finally, the necessary conditions for the optimality theorem of the proposed problem is stated and demonstrated.
This paper is concerned with finding the approximation solution (APPS) of a certain type of nonlinear hyperbolic boundary value problem (NOLHYBVP). The given BVP is written in its discrete (DI) weak form (WEF), and is proved that it has a unique APPS, which is obtained via the mixed Galerkin finite element method (GFE) with implicit method (MGFEIM) that reduces the problem to solve the Galerkin nonlinear algebraic system (GNAS). In this part, the predictor and the corrector technique (PT and CT) are proved convergent and are used to transform the obtained GNAS to linear (GLAS ), then the GLAS is solved using the Cholesky method (ChMe). The stability and the convergence of the method are studied. The results
... Show MoreDeveloping a new adaptive satellite images classification technique, based on a new way of merging between regression line of best fit and new empirical conditions methods. They are supervised methods to recognize different land cover types on Al habbinya region. These methods should be stand on physical ground that represents the reflection of land surface features. The first method has separated the arid lands and plants. Empirical thresholds of different TM combination bands; TM3, TM4, and TM5 were studied in the second method, to detect and separate water regions (shallow, bottomless, and very bottomless). The Optimum Index Factor (OIF) is computed for these combination bands, which realized
... Show MoreThis paper presents L1-adaptive controller for controlling uncertain parameters and time-varying unknown parameters to control the position of a DC servomotor. For the purpose of comparison, the effectiveness of L1-adaptive controller for position control of studied servomotor has been examined and compared with another adaptive controller; Model Reference Adaptive Controller (MRAC). Robustness of both L1-adaptive controller and model reference adaptive controller to different input reference signals and different structures of uncertainty were studied. Three different types of input signals are taken into account; ramp, step and sinusoidal. The L1-adaptive controller ensured uniformly bounded
... Show More