Preferred Language
Articles
/
ijs-2025
Multicomponent Inverse Lomax Stress-Strength Reliability
...Show More Authors

In this article we derive two reliability mathematical expressions of two kinds of s-out of -k stress-strength model systems; and . Both stress and strength are assumed to have an Inverse Lomax distribution with unknown shape parameters and a common known scale parameter. The increase and decrease in the real values of the two reliabilities are studied according to the increase and decrease in the distribution parameters. Two estimation methods are used to estimate the distribution parameters and the reliabilities, which are Maximum Likelihood and Regression. A comparison is made between the estimators based on a simulation study by the mean squared error criteria, which revealed that the maximum likelihood estimator works the best.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 15 2020
Journal Name
Modern Physics Letters A
Nuclear matter distributions of neutron rich 6He, 11Li, 14Be and 17B halo nuclei studied by the Bear Hodgson potential
...Show More Authors

The radial wave functions of the Bear–Hodgson potential have been used to study the ground state features such as the proton, neutron and matter densities and the as- sociated rms radii of two neutrons halo 6He, 11Li, 14Be and 17B nuclei. These halo nuclei are treated as a three-body system composed of core and outer two-neutron (Core + n + n). The radial wave functions of the Bear–Hodgson potential are used to describe the core and halo density distributions. The interaction of core-neutron takes the Bear–Hodgson potential form. The outer two neutrons of 6He and 11Li interact by the realistic interaction REWIL whereas those of 14Be and 17B interact by the realistic interaction of HASP. The obtained results show that this model succee

... Show More
View Publication
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improving Detection Rate of the Network Intrusion Detection System Based on Wrapper Feature Selection Approach
...Show More Authors

Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra

... Show More
View Publication Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Stability and Anti-Chaos Control of Discrete Quadratic Maps
...Show More Authors

A dynamical system describes the consequence of the current state of an event or particle in future. The models expressed by functions in the dynamical systems are more often deterministic, but these functions might also be stochastic in some cases. The prediction of the system's behavior in future is studied with the analytical solution of the implicit relations (Differential, Difference equations) and simulations. A discrete-time first order system of equations with quadratic nonlinearity is considered for study in this work. Classical approach of stability analysis using Jury's condition is employed to analyze the system's stability. The chaotic nature of the dynamical system is illustrated by the bifurcation theory. The enhancement o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Dynamics and an Optimal Policy for A Discrete Time System with Ricker Growth
...Show More Authors

The goal of this paper is to study dynamic behavior of a sporadic model (prey-predator). All fixed points of the model are found. We set the conditions that required to investigate the local stability of all fixed points. The model is extended to an optimal control model. The Pontryagin's maximum principle is used to achieve the optimal solutions. Finally, numerical simulations have been applied to confirm the theoretical results.

View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Experimental and Simulation for the Effect of Partial Shading on Solar Panel Performance
...Show More Authors

Partial shading is one of the problems that affects the power production and the efficiency of photovoltaic module. A series of experimental work have been done of partial shading of   monocrystalline PV module; 50W, Isc: 3.1A, Voc: 22V with 36 cells in series is achieved. Non-linear power output responses of the module are observed by applying various cases of partial shading (vertical and horizontal shading of solar cells in the module). Shading a single cell (corner cell) has the greatest impact on output energy. Horizontal shading or vertical shading reduced the power from 41W to 18W at constant solar radiation 1000W/m2 and steady state condition. Vertical blocking a column

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Environment Friendly Eco - City
...Show More Authors

The World witnessed over the past few decades a clear change in the urban existence map, where the number of cities' residents has increased and the cities geographic area expanded, also networks of roads and electric power stations were spread. This extraordinary events caused the drawing of a different identity to the world, race with itself in the field of energy and raw materials consumption. Therefore, the research issue individualizes in the lack of available knowledge concerning the subject of environment friendly ecological urban desiging and planning.So the research aims to define the environmentally friendly eco-city' structural elements and to clarify their most important planning and design foundations. To In

... Show More
View Publication Preview PDF
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
M A Modified Similarity Measure for Improving Accuracy of User-Based Collaborative Filtering: Nadia Fadhil
...Show More Authors

Production sites suffer from idle in marketing of their products because of the lack in the efficient systems that analyze and track the evaluation of customers to products; therefore some products remain untargeted despite their good quality. This research aims to build a modest model intended to take two aspects into considerations. The first aspect is diagnosing dependable users on the site depending on the number of products evaluated and the user's positive impact on rating. The second aspect is diagnosing products with low weights (unknown) to be generated and recommended to users depending on logarithm equation and the number of co-rated users. Collaborative filtering is one of the most knowledge discovery techniques used positive

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF