Preferred Language
Articles
/
jeasiq-896
Ant Colony Optimization Algorithm for Design of Distribution System with Practical Application
...Show More Authors

The Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods. 

The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for the dam that ensures optimal monthly water storage and drainage volumes.  The water study duration was for five years starting from first of October 2007 until September 30th, 2012. The data for these five years represents time series for monthly volumes of water demand, drainage, evaporation and storage. A new management system was proposed for Haditha dam that ensures a monthly storage volumes within the designed storage capacity of the reservoir and ensures no shortage with water availability that causes the usage of the dam turbine units. These results are optimal generation of hydroelectric energy and rationalization of electricity. The algorithm was developed and executed using Matlab software.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
WOAIP: Wireless Optimization Algorithm for Indoor Placement Based on Binary Particle Swarm Optimization (BPSO)
...Show More Authors

Optimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received s

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Pharmaceutical Inventory Database Management System
...Show More Authors

The main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 12 2019
Journal Name
Al-khwarizmi Engineering Journal
Optimization of Diffusion Bonding of Pure Copper (OFHC) with Stainless Steel 304L: .
...Show More Authors

This work deals with determination of optimum conditions of direct diffusion bonding welding of austenitic stainlesssteel type AISI 304L with Oxygen Free High Conductivity (OFHC) pure copper grade (C10200) in vacuum atmosphere of (1.5 *10-5 mbr.). Mini tab (response surface) was applied for optimizing the influence of diffusion bonding parameters (temperature, time and applied load) on the bonding joints characteristics and the empirical relationship was evaluated which represents the effect of each parameter of the process. The yield strength of diffusion bonded joint was equal to 153 MPa and the efficiency of joint was equal to 66.5% as compared with hard drawn copper. The diffusion zone reveals high microhardness than coppe

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Design of Hybrid Neural Fuzzy Controller for Human Robotic Leg System
...Show More Authors

 In this paper, the human robotic leg which can be represented mathematically by single input-single output (SISO) nonlinear differential model with one degree of freedom, is analyzed and then a simple hybrid neural fuzzy controller is designed to improve the performance of this human robotic leg model. This controller consists from SISO fuzzy proportional derivative (FPD) controller with nine rules summing with single node neural integral derivative (NID) controller with nonlinear function. The Matlab simulation results for nonlinear robotic leg model with the suggested controller showed that the efficiency of this controller when compared with the results of the leg model that is controlled by PI+2D, PD+NID, and F

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ROLE OF THE PROCUREMENT STRATEGY IN ACHIEVING INTEGRATED INDUSTRIAL DISTRIBUTION / CASE STUDY IN THE GENERAL COMPANY FOR THE DISTRIBUTION OF OIL PRODUCTS.: ROLE OF THE PROCUREMENT STRATEGY IN ACHIEVING INTEGRATED INDUSTRIAL DISTRIBUTION / CASE STUDY IN THE GENERAL COMPANY FOR THE DISTRIBUTION OF OIL PRODUCTS.
...Show More Authors

This study dealt with the management strategy as an independent variable and the integrated industrial distribution as a variable. The study aimed at finding the integrated industrial distribution that fits with the management strategy in providing the needs of the firm on the one hand and reducing the cost of management that is reflected in increasing its profits.
The researcher selected the data from (130) decision makers in the corporation and used the questionnaire as a tool for collecting data and used a set of statistical tools and tools suitable for the nature of information and were processed using the data analysis system (SPSS version 24) Based on the analysis of the responses of the sample and the test of correlation and

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Quadratic Form Ratio Multiple Test to Estimate Linear Regression Model Parameters in Big Data with Application: Child Labor in Iraq
...Show More Authors

              The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances.  From the diversity of Big Data variables comes many challenges that  can be interesting to the  researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of Robotic Arm Control System Mimics Human Arm Motion
...Show More Authors

This paper presents a control system to make the robotic hand mimic human hand motion in real time and offline mode. The human hand tracking system is a wearable sensing arm (potentiometers) used to determine the position in space and to sense the grasping task of human hand. The maskable sensing arm was designed with same geometrical arrangement of robotic hand that needs to be controlled. The control software of a robot was implemented using Visual Basic and supported with graphical user interface (GUI). The control algorithm depends on joint to joint mapping method to match between the motions at each joint of portable sensing arm with corresponding joint of a robot in order to make the robot mimic the motion.

View Publication Preview PDF