Preferred Language
Articles
/
bsj-9766
SBOA: A Novel Heuristic Optimization Algorithm
...Show More Authors

A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducted tests on ten single-objective functions from the 2019 benchmark functions of the Evolutionary Computation (CEC), as well as twenty-four single-objective functions from the 2022 CEC benchmark functions, in addition to four engineering problems. Seven comparative algorithms were utilized: the Differential Evolution Algorithm (DE), Sparrow Search Algorithm (SSA), Sine Cosine Algorithm (SCA), Whale Optimization Algorithm (WOA), Butterfly Optimization Algorithm (BOA), Lion Swarm Optimization (LSO), and Golden Jackal Optimization (GJO). The results of these diverse experiments were compared in terms of accuracy and convergence curve speed. The findings suggest that SBOA is a straightforward and viable approach that, overall, outperforms the aforementioned algorithms.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 24 2024
Journal Name
Arab World English Journal
A Critical Discourse Analysis of Women’s Representation in Maysaloon Hadi’s Novel The Black Eyes
...Show More Authors

This study applies a discourse analysis framework to explore the portrayal of women in Maysloon Hadi’s novel (The Black Eyes) (2011), using Critical Discourse Analysis (CDA) and Norman Fairclough’s tri-dimensional model (1989) as the analytical foundation. It investigates the roles and challenges women face in the novel. While there is growing interest in the portrayal of women in literature, Iraqi literature—especially from the perspective of Iraqi women writers remains underexplored. Hadi’s *The Black Eyes* provides a unique case to examine this intersection. Despite the novel’s rich narrative, which offers insight into Iraqi women’s lives, there is a lack of comprehensive CDA to understand how its language constructs

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Feb 21 2017
Journal Name
Biomechanics And Modeling In Mechanobiology
A novel method for non-invasively detecting the severity and location of aortic aneurysms
...Show More Authors

The influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr

... Show More
View Publication Preview PDF
Scopus (34)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Robust Optimization with practical application
...Show More Authors

The purpose of this paper is applying the robustness in Linear programming(LP) to get rid of uncertainty problem in constraint parameters, and find the robust optimal solution, to maximize the profits of the general productive company of vegetable oils for the year 2019, through the modify on a mathematical model of linear programming when some parameters of the model have uncertain values, and being processed it using robust counterpart of linear programming to get robust results from the random changes that happen in uncertain values ​​of the problem, assuming these values belong to the uncertainty set and selecting the values that cause the worst results and to depend buil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Aug 21 2019
Journal Name
Al-khwarizmi Engineering Journal
Design and Optimization of a Surface-Mounted Permanent-Magnet Linear Synchronous Motor with Maxwell ANSYS
...Show More Authors

Linear motor offers several features in many applications that require linear motion. Nevertheless, the presence of cogging force can deteriorate the thrust of a permanent magnet linear motor. Using several methodologies, a design of synchronous single sided linear iron-core motor was proposed. According to exact formulas with surface-mounted magnets and concentrated winding specification, which are relying on geometrical parameters. Two-dimensional performance analysis of the designed model and its multi-objective optimization were accomplished as a method to reduce the motor cogging force using MAXWELL ANSYS. The optimum model design results showed that the maximum force ripple was approximatrly reduced by 81.24%compared to the origina

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Engineering
Optimal Economic Design of Diversion Structures during Construction of a Dam by Particle Swarm Optimization
...Show More Authors

Publication Date
Thu Jan 30 2020
Journal Name
Telecommunication Systems
Nature-inspired optimization algorithms for community detection in complex networks: a review and future trends
...Show More Authors

View Publication
Scopus (30)
Crossref (25)
Scopus Clarivate Crossref