Preferred Language
Articles
/
bsj-3187
Solving Mixed Volterra - Fredholm Integral Equation (MVFIE) by Designing Neural Network
...Show More Authors

       In this paper, we focus on designing feed forward neural network (FFNN) for solving Mixed Volterra – Fredholm Integral Equations (MVFIEs) of second kind in 2–dimensions. in our method, we present a multi – layers model consisting of a hidden layer which has five hidden units (neurons) and one linear output unit. Transfer function (Log – sigmoid) and training algorithm (Levenberg – Marquardt) are used as a sigmoid activation of each unit. A comparison between the results of numerical experiment and the analytic solution of some examples has been carried out in order to justify the efficiency and the accuracy of our method.

                                 

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Solution for Multi-Objective Optimisation Master Production Scheduling Problems Based on Swarm Intelligence Algorithms
...Show More Authors

The emphasis of Master Production Scheduling (MPS) or tactic planning is on time and spatial disintegration of the cumulative planning targets and forecasts, along with the provision and forecast of the required resources. This procedure eventually becomes considerably difficult and slow as the number of resources, products and periods considered increases. A number of studies have been carried out to understand these impediments and formulate algorithms to optimise the production planning problem, or more specifically the master production scheduling (MPS) problem. These algorithms include an Evolutionary Algorithm called Genetic Algorithm, a Swarm Intelligence methodology called Gravitational Search Algorithm (GSA), Bat Algorithm (BAT), T

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (13)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
تحسين " مقدرات المتغيرات المساعدة بطريقة جاكنايف " باستعمال صنف من أصناف خوارزمية المناعة مع تطبيق عملي
...Show More Authors

تستند أغلب الطرائق الحصينة على فكرة التنازل عن جانب معين مقابل تقوية جانب آخر من خلال عدة أساليب أما آليات الذكاء الصناعي تحاول عمل موازنة بين الضعف والقوة للوصول إلى أفضل الحلول بأسلوب بحث عشوائي . في هذا البحث تم تقديم فكرة جديدة لتحسين مقدرات معلمات نماذج المعادلات الآنية الخطية الناتجة من طريقة المتغيرات المساعدة حسب طريقة جاكنايف Jackknife Instrumental Variable Estimation(JIVE) وذل

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
A Comparative Study of Single-Constraint Routing in Wireless Mesh Networks Using Different Dynamic Programming Algorithms
...Show More Authors

Finding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorith

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Complexes of Some Transition Metal with 2-Benzoyl thiobenzimidazole and 1,10-Phenanthroline and Studying their Antibacterial Activity
...Show More Authors

Mixed ligands of 2-benzoyl Thiobenzimiazole (L1) with 1,10-phenanthroline (L2) complexes of Cr(III) , Ni(II) and Cu(II) ions were prepared. The ligand and the complexes were isolated and characterized in solid state by using FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR, flame atomic absorption, elemental micro analysis C.H.N.S, magnetic susceptibility , melting points and conductivity measurements. 2-Benzoyl thiobenzimiazole behaves as bidenetate through oxygen atom of carbonyl group and nitrogen atom of imine group. From the analyses Octahedral geometry was suggested for all prepared complexes. A theoretical treatment of ligands and their metal complexes in gas phase were studied using HyperChem-8 program, moreover, ligands in gas phase

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Optimal Location of Static Synchronous Compensator (STATCOM) for IEEE 5-Bus Standard System Using Genetic Algorithm
...Show More Authors

Heuristic approaches are traditionally applied to find the optimal size and optimal location of Flexible AC Transmission Systems (FACTS) devices in power systems. Genetic Algorithm (GA) technique has been applied to solve power engineering optimization problems giving better results than classical methods. This paper shows the application of GA for optimal sizing and allocation of a Static Compensator (STATCOM) in a power system. STATCOM devices used to increase transmission systems capacity and enhance voltage stability by regulate the voltages at its terminal by controlling the amount of reactive power injected into or absorbed from the power system. IEEE 5-bus standard system is used as an example to illustrate the te

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Advances In Science And Technology Research Journal
Power Predicting for Power Take-Off Shaft of a Disc Maize Silage Harvester Using Machine Learning
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed May 04 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Knee Meniscus Segmentation and Tear Detection Based On Magnitic Resonacis Images: A Review of Literature
...Show More Authors

The meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when

... Show More
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Fixed Point Theorems in General Metric Space with an Application
...Show More Authors

   This paper aims to prove an existence theorem for Voltera-type equation in a generalized G- metric space, called the -metric space, where the fixed-point theorem in - metric space is discussed and its application.  First, a new contraction of Hardy-Rogess type is presented and also then fixed point theorem is established for these contractions in the setup of -metric spaces. As application, an existence result for Voltera integral equation is obtained.  

View Publication Preview PDF
Scopus (13)
Scopus Clarivate Crossref