The aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter system performance. The simulation results show also that the proposed control system when compared with the other controllers results has the capability of minimizing the rising time to ( sec) and the settling time to ( sec) in the transient response and minimizing the voltage tracking error of the system output to ( ) volt at the steady state response. Furthermore, the number of fitness evaluations is decreased.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show Moret:
The most famous thing a person does is talk. He loves and hates, and continues with it confirming relationships, and with it, too, comes out of disbelief into faith. Marry a word and separate with a word. He reaches the top of the heavens with a kind word, with which he will gain the pleasure of God, and the Lord of a word that the servant speaks to which God writes with our pleasure or throws him on his face in the fire. Emotions are inflamed, the United Nations is intensified with a word, and relations between states and war continue with a word.
What comes out of a person’s mouth is a translator that expresses the repository of his conscience and reveals the place of his bed, for it is evidence of
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t
Notwithstanding the importance of international cooperation as the other facet of international interactions, a strategy of conflict resolution, a maintainer of international peace and security, its provision in the United Nations conventions, as an objective of the United Nations after the international peace and security, however, the recognition of international cooperation has not been underlined by global, intellectual think tanks. While realism emphasized on the state's role in achieving international cooperation to ensure mutual and multilateral interests, liberalism focused on the role of international organizations in building such cooperation. Additionally, constructivist approaches developed other sub-variables to contribute to t
... Show More
In The Bluest Eye (1970), the American-African writer, Toni Morrison explores how
Western standards of ideal beauty are created and propagated with and among the black
community. The novel not only portrays the lives of those whose dark skinned and Negroid
features blight their lives; it also shows how the standard of white beauty, when imposed on
black youth, can drastically damage one’s self-love and esteem which usually occurs when
beauty goes unrecognized. Morrison in this novel focuses on the damage that the black
women characters suffer through the construction of femininity in a racialised society where
whiteness is used as a standard of beauty.
This study carry’s out the correlation and the effect of two main variables, these variables are Job Satisfaction included six sub: wages - salaries and justice and yield, working conditions and services, pattern of supervision and the relationship with the manger, Relationship with colleagues, the content of the work and the variety of tasks, development and promotion opportunities available to an individual, and Organizational Performance included two sub variables: Efficiency, Effectiveness. This research was conducted using a questioner as a main tool, This questioner was distributed randomly to a research community composed of
... Show MoreKE Sharquie, AA Noaimi, SD Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 15