Preferred Language
Articles
/
ijs-552
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
...Show More Authors

     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or  broken to  crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Algorithms Based Nonlinear PID Neural Trajectory Tracking Controller for the Differential Wheeled Mobile Robot Model
...Show More Authors

This paper presents a comparative study of two learning algorithms for the nonlinear PID neural trajectory tracking controller for mobile robot in order to follow a pre-defined path. As simple and fast tuning technique, genetic and particle swarm optimization algorithms are used to tune the nonlinear PID neural controller's parameters to find the best velocities control actions of the right wheel and left wheel for the real mobile robot. Polywog wavelet activation function is used in the structure of the nonlinear PID neural controller. Simulation results (Matlab) and experimental work (LabVIEW) show that the proposed nonlinear PID controller with PSO
learning algorithm is more effective and robust than genetic learning algorithm; thi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
The Optimal Control Problem for Triple Nonlinear Parabolic Boundary Value Problem with State Vector Constraints
...Show More Authors

       In this paper, the classical continuous triple optimal control problem (CCTOCP) for the triple nonlinear parabolic boundary value problem (TNLPBVP) with state vector constraints (SVCs) is studied.  The solvability theorem for the classical continuous triple optimal control vector CCTOCV with the SVCs is stated and proved. This is done under suitable conditions. The mathematical formulation of the adjoint triple boundary value problem (ATHBVP) associated with TNLPBVP is discovered. The Fréchet derivative of the Hamiltonian" is derived.  Under suitable conditions, theorems of necessary  and sufficient conditions for the optimality of the TNLPBVP with the SVCs are stated and proved.    

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 17 2016
Journal Name
Plos One
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
...Show More Authors

Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Field Programmable Gate Array (FPGA) Model of Intelligent Traffic Light System with Saving Power
...Show More Authors

In this paper, a FPGA model of intelligent traffic light system with power saving was built. The intelligent traffic light system consists of sensors placed on the side's ends of the intersection to sense the presence or absence of vehicles. This system reduces the waiting time when the traffic light is red, through the transition from traffic light state to the other state, when the first state spends a lot of time, because there are no more vehicles. The proposed system is built using VHDL, simulated using Xilinx ISE 9.2i package, and implemented using Spartan-3A XC3S700A FPGA kit. Implementation and Simulation behavioral model results show that the proposed intelligent traffic light system model satisfies the specified operational req

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 24 2021
Journal Name
Iraqi Journal Of Science
On The Class of (K-N)* Quasi-N-Normal Operators on Hilbert Space
...Show More Authors

In this paper, we will give another class of normal operator which is (K-N)*
quasi-n-normal operator in Hilbert space, and give some properties of this concept
as well as discussion the relation between this class with another class of normal
operators.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Text-based Steganography using Huffman Compression and AES Encryption Algorithm
...Show More Authors

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Oct 30 2019
Journal Name
Journal Of Legal Sciences
Applications des picable motive in some contemporary crimes
...Show More Authors

Considered despicable motive of the most accurate indicators that reveal the amount of serious criminal, Which involves the character of the perpetrator and on whose basis the penalty is estimated,The origin is that the despicable motive doesnot affect the existence of the crime ,But it affects in punishment, the despicable motive has a set of characteristics that ensure its distinctiveness from other cases that have an indication of the perpetrator of the crime,the despicable motive has privacy in some contemporary crimes, as it enters the composition of the criminal intent of the actor does not do the moral side without it.and therefore it is not doing crime,Such as terrorist offenses, hate crimes and the offense of in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
The Continuous Classical Boundary Optimal Control of Triple Nonlinear Elliptic Partial Differential Equations with State Constraints
...Show More Authors

    Our aim in this work is to study the classical continuous boundary control vector  problem for triple nonlinear partial differential equations of elliptic type involving a Neumann boundary control. At first, we prove that the triple nonlinear partial differential equations of elliptic type with a given classical continuous boundary control vector have a unique "state" solution vector,  by using the Minty-Browder Theorem. In addition, we prove the existence of a classical continuous boundary optimal control vector ruled by the triple nonlinear partial differential equations of elliptic type with equality and inequality constraints. We study the existence of the unique solution for the triple adjoint equations

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref