Preferred Language
Articles
/
ijp-1118
Studying the Effect of Initial Conditions and System Parameters on the Behavior of a Chaotic Duffing System
...Show More Authors

This work presents a five-period chaotic system called the Duffing system, in which the effect of changing the initial conditions and system parameters d, g and w, on the behavior of the chaotic system, is studied. This work provides a complete analysis of system properties such as time series, attractors, and Fast Fourier Transformation Spectrum (FFT). The system shows periodic behavior when the initial conditions xi and yi equal 0.8 and 0, respectively, then the system becomes quasi-chaotic when the initial conditions xi and yi equal 0 and 0, and when the system parameters d, g and w equal 0.02, 8 and 0.09. Finally, the system exhibits hyperchaotic behavior at the first two conditions, 0 and 0, and the bandwidth of the chaotic signal becomes wider (2 a.u.) than in the first case. So, this system can be used in many physical applications, such as encrypting confidential information.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Using Public and Private Cloud Computing in developing the Evaluation System of annual employees' performance at Iraqi Universities: A comparative study
...Show More Authors

Abstract

Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Disc Laser System Construction and Characterization
...Show More Authors

 In this work a Nd:YVO4 thin disc laser setup is designed and fabricated. The disk laser system
is designed to be compact. The laser crystal was pumped by a 808 nm diode laser. The effect of input
current and pulse frequency on the output energy at pulse operation mode, and the effect of the input
current on the output power at CW mode operation are tested. At the pulsed mode, the output energy
increased linearly with the input current and decreased with pulse frequency. The threshold current
increased with increasing pulse frequency increasing. The maximum output energy from the thin disc
laser was 0.98 μJ at 1.3 kHz frequency, with 0.49A. A minimum threshold current for CW mode of
operation. The maximum outpu

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives J.
Effect of planting distance on yield and yield components of four introduced upland rice varieties underaerobic conditions
...Show More Authors

Scopus (5)
Scopus
Publication Date
Tue Jul 12 2022
Journal Name
Proceedings Of Seventh International Congress On Information And Communication Technology
Identification of Key Criteria of Selecting the Delivery System and Type of Contract in Construction Projects
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (47)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2012
Journal Name
I-manger's Journal On Information Technology
A MODULE FOR ENHANCING RECOGNITION SYSTEM FOR QR CODE SCANNED IMAGE
...Show More Authors

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Publication Date
Fri Apr 21 2023
Journal Name
Aip Conference Proceedings
Efficient computational methods for solving the nonlinear initial and boundary value problems
...Show More Authors

In this paper, three approximate methods namely the Bernoulli, the Bernstein, and the shifted Legendre polynomials operational matrices are presented to solve two important nonlinear ordinary differential equations that appeared in engineering and applied science. The Riccati and the Darcy-Brinkman-Forchheimer moment equations are solved and the approximate solutions are obtained. The methods are summarized by converting the nonlinear differential equations into a nonlinear system of algebraic equations that is solved using Mathematica®12. The efficiency of these methods was investigated by calculating the root mean square error (RMS) and the maximum error remainder (𝑀𝐸𝑅n) and it was found that the accuracy increases with increasi

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref