Preferred Language
Articles
/
ijp-1118
Studying the Effect of Initial Conditions and System Parameters on the Behavior of a Chaotic Duffing System
...Show More Authors

This work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic signal becomes wider (2 a.u.) than in the first case. So, this system can be used in many physical applications, such as encrypting confidential information.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (51)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 21 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

In this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 12 2022
Journal Name
Proceedings Of Seventh International Congress On Information And Communication Technology
Identification of Key Criteria of Selecting the Delivery System and Type of Contract in Construction Projects
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Using Public and Private Cloud Computing in developing the Evaluation System of annual employees' performance at Iraqi Universities: A comparative study
...Show More Authors

Abstract

Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 10 2020
Journal Name
International Journal Of Pharmaceutical Research
Extraction, Purification of Alkaloid Compounds from Anastatica Hierochuntica and Studying its Effect on Liver Cancer Cells
...Show More Authors

The current study included the separation of three alkaloid compounds from Anastatica Hierochuntica and studied the effect of the these compounds on cancerous cells , specifically liver cancer it was found that compound number one is the most influential or inhibiting at 50 percent followed by compound number three when using concentration of 400 μg/mL.

Publication Date
Mon Nov 02 2020
Journal Name
International Journal Of Pharmaceutical Research
Extraction, Purification of Alkaloid Compounds from Anastatica Hierochuntica and Studying its Effect on Liver Cancer Cells
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Dust Effect on the Efficiency of Silicon Mono Crystalline Solar Modules at Different Tilt Angles at Al-Jadryia Climate Conditions
...Show More Authors

Solar energy usage in Iraq is facing many issues; one of those is the accumulation “of the dust on the surface of the solar module which” would highly lower its efficiency. The present work study the effect of dust accumulation” on installing fixed solar modules with different inclined angles 15o, 33o, 45o, 60o. Evaluation of the solar modules performance under different circumstance conditions such as rain, wind and humidity are considered in study of dust effect on solar module performance. The results show that the lowest output average efficiencies of solar modules occurs at 15o horizontally inclined angle are 7.4% , 6.7% , 8.0% , 8.1%, and 8.4% for the cor

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Case Studies In Thermal Engineering
An investigation of dynamic behavior of the cylindrical shells under thermal effect
...Show More Authors

View Publication
Scopus (22)
Crossref (15)
Scopus Clarivate Crossref