Preferred Language
Articles
/
bsj-3672
Modified BFGS Update (H-Version) Based on the Determinant Property of Inverse of Hessian Matrix for Unconstrained Optimization
...Show More Authors

The study presents the modification of the Broyden-Flecher-Goldfarb-Shanno (BFGS) update (H-Version) based on the determinant property of inverse of Hessian matrix (second derivative of the objective function), via updating of the vector s ( the difference between the next solution and the current solution), such that the determinant of the next inverse of Hessian matrix is equal to the determinant of the current inverse of Hessian matrix at every iteration. Moreover, the sequence of inverse of Hessian matrix generated by the method would never  approach a near-singular matrix, such that the program would never break before the minimum value of the objective function is obtained. Moreover, the new modification of BFGS update (H-version) preserves the symmetric property and the positive definite property without any condition.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (50)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (19)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the relationship between the skills required for the labor market and the employment of graduates of community colleges in KSA: An applied study on a sample of faculty members at KKU
...Show More Authors

This study has aimed to measure the relationship between the skills required for the labor market and the employment of graduates of community colleges at King Khalid University. For gathering the required data, a questionnaire has been designed and distributed to the faculty members of community colleges at King Khalid University in a random sample method. The chosen sample size has covered (123) individuals. Questionnaire forms have been distributed and retrieved from (117) participants. Therefore, the estimated response has reached 95 % of the total sample size. The results of the study have shown that there is not any significant relationship between the skills which the graduates   acquire and the requirements of employmen

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
The Repercussions of the Corona Pandemic (Covid 19) and its Impact on the Educational and Psychological Function of the Omani Family:
...Show More Authors

Abstract

This study aims to identify the repercussions of the Corona pandemic (Covid 19) and its impact on the educational and psychological functions of the Omani family from the point of view of a number of fathers and mothers. Drive for a group of fathers and mothers, some of whom work in the government sector and others are mothers enrolled in graduate studies programs at the university, their ages range between (30-50 years) totally (28) mothers and fathers: 22 mothers and 6 fathers. The results showed that the repercussions of the transformation of e-learning, home quarantine, social distancing, and the challenges associated with them were among the most frequent responses that posed a real challenge to the

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
The Effect of Walled Nano-Carbon on the Physical, Thermal and Mechanical Properties of Epoxy
...Show More Authors

The physical, the thermal and the mechanical properties of Nano-composites, that consisted of Polyprime EP epoxy that reinforced by multi-walled carbon nanotubes (MWCNTs), have been studied. Various loading ratios, 0.1, 0.5, and 1 wt. %of MWCNT shave been infused into epoxy by a magnetic stirrer and then the hardener mixed with the mthat supplied with the epoxy. All sample shave been cutting using CNC machine. Tensile test, three-point bending, hardness tests, lee's disk, differential scanning calorimetry, water absorption and dielectric and electrical conductivity test were utilized on unfilled, MWCNT-filled epoxy to identify the loading effect on the properties of materials. Scanning electron microscopy (SEM) was used to determine the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparing the Sequential Nonlinear least squared Method and Sequential robust M method to estimate the parameters of Two Dimensional sinusoidal signal model:
...Show More Authors

Estimation of the unknown parameters in 2-D sinusoidal signal model can be considered as important and difficult problem. Due to the difficulty to find estimate of all the parameters of this type of models at the same time, we propose sequential non-liner least squares method and sequential robust  M method after their development through the use of sequential  approach in the estimate suggested by Prasad et al to estimate unknown frequencies and amplitudes for the 2-D sinusoidal compounds but depending on Downhill Simplex Algorithm in solving non-linear equations for the purpose of obtaining non-linear parameters estimation which represents frequencies and then use of least squares formula to estimate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems
...Show More Authors

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

View Publication
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Text image secret sharing with hiding based on color feature
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref