Preferred Language
Articles
/
ijs-8373
Efficient Algorithm for Solving Fuzzy Singularly Perturbed Volterra Integro-Differential Equation

     In this paper, we design a fuzzy neural network to solve fuzzy singularly perturbed Volterra integro-differential equation by using a High Performance Training Algorithm such as the Levenberge-Marqaurdt (TrianLM) and the sigmoid function of the hidden units which is the hyperbolic tangent activation function. A fuzzy trial solution to fuzzy singularly perturbed Volterra integro-differential equation is written as a sum of two components. The first component meets the fuzzy requirements, however, it does not have any fuzzy adjustable parameters. The second component is a feed-forward fuzzy neural network with fuzzy adjustable parameters. The proposed method is compared with the analytical solutions. We find that the proposed method has excellent accuracy in findings, a lower error rate, and faster convergence than other typical methods.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
Re-Evaluation Solution Methods for Kepler's Equation of an Elliptical Orbit

An evaluation was achieved by designing a matlab program to solve Kepler’s equation of an elliptical orbit for methods (Newton-Raphson, Danby, Halley and Mikkola). This involves calculating the Eccentric anomaly (E) from mean anomaly (M=0°-360°) for each step and for different values of eccentricities (e=0.1, 0.3, 0.5, 0.7 and 0.9). The results of E were demonstrated that Newton’s- Raphson Danby’s, Halley’s can be used for e between (0-1). Mikkola’s method can be used for e between (0-0.6).The term  that added to Danby’s method to obtain the solution of Kepler’s equation is not influence too much on the value of E. The most appropriate initial Gauss value was also determined to

... Show More
Scopus (10)
Crossref (6)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Determination Optimum Inventory Level for Material Using Genetic Algorithm

The integration of decision-making will lead to the robust of its decisions, and then determination optimum inventory level to the required materials to produce and reduce the total cost by the cooperation of purchasing department with inventory department and also with other company,s departments. Two models are suggested to determine Optimum Inventory Level (OIL), the first model (OIL-model 1) assumed that the inventory level for materials quantities equal to the required materials, while the second model (OIL-model 2) assumed that the inventory level for materials quantities more than the required materials for the next period.             &nb

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

Crossref
View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

Crossref (1)
Crossref
View Publication
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improved High order Euler Method for Numerical Solution of Initial value Time- Lag Differential Equations

The goal of this paper is to expose a new numerical method for solving initial value time-lag of delay differential equations by employing a high order improving formula of Euler method known as third order Euler method. Stability condition is discussed in detail for the proposed technique. Finally some examples are illustrated to verify the validity, efficiency and accuracy of the method.

View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weak Essential Fuzzy Submodules Of Fuzzy Modules

        Throughout this paper, we introduce the notion of weak essential F-submodules of F-modules as a generalization of  weak essential submodules. Also we study the homomorphic image and inverse image of weak essential F-submodules.

Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Fri Jul 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Semiessential Fuzzy Ideals and Semiuniform Fuzzy Rings

        Zadah in [1] introduced the notion of a fuzzy subset A of a nonempty set S as a mapping from S into [0,1], Liu in [2] introduced the concept of a fuzzy ring, Martines [3] introduced the notion of a fuzzy ideal of a fuzzy ring.         A non zero proper ideal I of a ring R is called an essential ideal if I  J  (0), for any non zero ideal J of R, [4].         Inaam in [5] fuzzified this concept to essential fuzzy ideal of fuzzy ring and gave its basic properties.         Nada in [6] introduced and studied notion of semiessential ideal in a ring R, where a non zero i

... Show More
View Publication Preview PDF