Preferred Language
Articles
/
bsj-1549
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Solving Two-Points Singular Boundary Value Problem Using Hermite Interpolation
...Show More Authors

In this paper, we have been used the Hermite interpolation method to solve second order regular boundary value problems for singular ordinary differential equations. The suggest method applied after divided the domain into many subdomains then used Hermite interpolation on each subdomain, the solution of the equation is equal to summation of the solution in each subdomain. Finally, we gave many examples to illustrate the suggested method and its efficiency.

View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
International Journal Of Computational Intelligence Systems
Prediction of ROP Zones Using Deep Learning Algorithms and Voting Classifier Technique
...Show More Authors
Abstract<p>Retinopathy of prematurity (ROP) can cause blindness in premature neonates. It is diagnosed when new blood vessels form abnormally in the retina. However, people at high risk of ROP might benefit significantly from early detection and treatment. Therefore, early diagnosis of ROP is vital in averting visual impairment. However, due to a lack of medical experience in detecting this condition, many people refuse treatment; this is especially troublesome given the rising cases of ROP. To deal with this problem, we trained three transfer learning models (VGG-19, ResNet-50, and EfficientNetB5) and a convolutional neural network (CNN) to identify the zones of ROP in preterm newborns. The dataset to train th</p> ... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Linear Boundary Value Problem Using Shooting Continuous Explicit Runge-Kutta Method
...Show More Authors

  In this paper we shall generalize fifth explicit Runge-Kutta Feldberg(ERKF(5)) and Continuous explicit Runge-Kutta (CERK) method using shooting method to solve second order boundary value problem  which can be reduced to order one.These methods we shall call them as shooting Continuous Explicit Runge-Kutta method, the results are computed using matlab program.

View Publication Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
The Continuous Classical Boundary Optimal Control of Couple Nonlinear Hyperbolic Boundary Value Problem with Equality and Inequality Constraints
...Show More Authors

The paper is concerned with the state and proof of the existence theorem of a unique solution (state vector) of couple nonlinear hyperbolic equations (CNLHEQS) via the Galerkin method (GM) with the Aubin theorem. When the continuous classical boundary control vector (CCBCV) is known, the theorem of existence a CCBOCV with equality and inequality state vector constraints (EIESVC) is stated and proved, the existence theorem of a unique solution of the adjoint couple equations (ADCEQS) associated with the state equations is studied. The Frcéhet derivative derivation of the "Hamiltonian" is obtained. Finally the necessary theorem (necessary conditions "NCs") and the sufficient theorem (sufficient conditions" SCs") for optimality of the stat

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sat Mar 05 2022
Journal Name
Mathematical Methods In The Applied Sciences
Double‐diffusive convection on peristaltic flow of hyperbolic tangent nanofluid in non‐uniform channel with induced magnetic field
...Show More Authors

Consequence of thermal and concentration convection on peristaltic pumping of hyperbolic tangent nanofluid in a non‐uniform channel and induced magnetic field is discussed in this article. The brief mathematical modeling, along with induced magnetic field, of hyperbolic tangent nanofluid is given. The governing equations are reduced to dimensionless form by using appropriate transformations. Exact solutions are calculated for temperature, nanoparticle volume fraction, and concentration. Numerical technique is manipulated to solve the highly non‐linear differential equations. The roll of different variables is graphically analyzed in terms of concentration, temperature, volume fraction of nanoparticles, axial induced magnetic fie

... Show More
View Publication
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Recurrent Stroke Prediction using Machine Learning Algorithms with Clinical Public Datasets: An Empirical Performance Evaluation
...Show More Authors

Recurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Deriving the Composite Simpson Rule by Using Bernstein Polynomials for Solving Volterra Integral Equations
...Show More Authors

In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.

View Publication Preview PDF
Crossref (1)
Crossref