Preferred Language
Articles
/
ijs-2133
Numerical Solutions for the Optimal Control Governing by Variable Coefficients Nonlinear Hyperbolic Boundary Value Problem Using the Gradient Projection, Gradient and Frank Wolfe Methods

This paper is concerned with studying the numerical solution for the discrete classical optimal control problem (NSDCOCP) governed by a variable coefficients nonlinear hyperbolic boundary value problem (VCNLHBVP). The DSCOCP is solved by using the Galerkin finite element method (GFEM) for the space variable and implicit finite difference scheme (GFEM-IFDS) for the time variable to get the NS for the discrete weak form (DWF) and for the discrete adjoint weak form (DSAWF) While, the gradient projection method (GRPM), also called the gradient method (GRM), or the Frank Wolfe method (FRM) are used to minimize the discrete cost function (DCF) to find the DSCOC. Within these three methods, the Armijo step option (ARMSO) or the optimal step option (OPSO) are used to improve the discrete classical control (DSCC). Finally, some illustrative examples for the problem are given to show the accuracy and efficiency of the methods.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archives
Scopus
Publication Date
Thu Dec 08 2011
Journal Name
مجلة الاداب
View Publication
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography

     Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Online Journal Of Veterinary Research
Publication Date
Sat Sep 03 2022
Journal Name
International Journal Of Health Sciences
Biological treatment of hydrocarbons contaminated soil by Serratia ficaria

Petroleum is one of the most important substances consumed by man at present times, a major energy source in this century, petroleum oils can cause environmental pollution during various stages of production, transportation, refining and use, petroleum hydrocarbons pollutions ranging from soil, ground water to marine environment, become an inevitable problem in the modern life, current study focused on bioremediation process of hydrocarbons contaminants that remaining in the bottom of gas cylinders and discharged to the soil. Twenty-four bacterial isolates were isolated from contaminated soils all of them gram negative bacteria, bacterial isolates screening to investigate the ability of biodegradation of hydrocarbons, these isolates

... Show More
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
Crossref
View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Bioethanol Production by Candida tropicalis Isolated from Sheep Dung

 Microorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and CandidaC.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis  in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Some Theorems of Fixed Point Approximations By Iteration Processes
Abstract<p>The purpose of this paper, is to study different iterations algorithms types three_steps called, new iteration, <italic>M</italic> <sup>∗</sup> −iteration, <italic>k</italic> −iteration, and Noor-iteration, for approximation of fixed points. We show that the new iteration process is faster than the existing leading iteration processes like <italic>M</italic> <sup>∗</sup> −iteration, <italic>k</italic> −iteration, and Noor-iteration process, for like contraction mappings. We support our analytic proof with a numerical example.</p>
Scopus (2)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Sun Mar 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
View Publication Preview PDF