Preferred Language
Articles
/
joe-1067
Bat Algorithm Based an Adaptive PID Controller Design for Buck Converter Model
...Show More Authors

The aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter system performance. The simulation results show also that the proposed control system when compared with the other controllers results has the capability of minimizing the rising time to (  sec) and the settling time to (  sec) in the transient response and minimizing the voltage tracking error of the system output to ( ) volt at the steady state response. Furthermore, the number of fitness evaluations is decreased.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Interactive Design of Pediatric Hospital spaces
...Show More Authors

View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (18)
Crossref (12)
Scopus Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
The Composition of design according to norm renovation in the interior design space
...Show More Authors

The interior spaces represent a true reflection of the concepts and values ​​of humanity and requirements; were interested in current research ongoing changes that have occurred in those human values ​​and requirements over time, even pat each time warp its values ​​and its own requirements. Those changes, which receive Bdilalha the spaces linked by a renewal which guarantees the interior design of the spaces of sustainability and bio-coordinated. Launched search from an initial perception that those associated with the changes of the spaces through time that have not been subject to examination and supervision, they will constitute a continuing threat of losing the ties with the past under the pretext of modernization and mo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Design requirements according to the formal integration in the design of interior spaces
...Show More Authors

The formal integration of the interior spaces in general and the commercial spaces of the watch shops in the large commercial centers in particular is the goal that the designers aim to reach in order for the interior space to become successful in terms of the design idea and its characteristics. Implementation mechanism. One of the reasons for achieving formal integration in the interior spaces of watch shops is the requirements of the design that must be available in these spaces to reach a state of formal integration between the interior and the exterior so that the space becomes fully integrated in all respects. Because of the aforementioned reasons for dealing with the research, through four chapters: The first chapter included the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 14 2014
Journal Name
International Journal Of Computer Applications
Parallelizing RSA Algorithm on Multicore CPU and GPU
...Show More Authors

View Publication
Crossref (10)
Crossref
Publication Date
Mon Apr 26 2021
Journal Name
Journal Of Real-time Image Processing
Fast and efficient recursive algorithm of Meixner polynomials
...Show More Authors

View Publication
Scopus (32)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Engineering And Technology Journal
Face Retrieval Using Image Moments and Genetic Algorithm
...Show More Authors

Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Nurse Scheduling Problem Using Hybrid Simulated Annealing Algorithm
...Show More Authors

Nurse scheduling problem is one of combinatorial optimization problems and it is one of NP-Hard problems which is difficult to be solved as optimal solution. In this paper, we had created an proposed algorithm which it is hybrid simulated annealing algorithm to solve nurse scheduling problem, developed the simulated annealing algorithm and Genetic algorithm. We can note that the proposed algorithm (Hybrid simulated Annealing Algorithm(GS-h)) is the best method among other methods which it is used in this paper because it satisfied minimum average of the total cost and maximum number of Solved , Best and Optimal problems. So we can note that the ratios of the optimal solution are 77% for the proposed algorithm(GS-h), 28.75% for Si

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Dec 19 2017
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Reaction Kinetic of Al- Doura Heavy Naphtha Reforming Process Using Genetic Algorithm
...Show More Authors

In this study, genetic algorithm was used to predict the reaction kinetics of Iraqi heavy naphtha catalytic reforming process located in Al-Doura refinery in Baghdad.  One-dimensional steady state model was derived to describe commercial catalytic reforming unit consisting of four catalytic reforming reactors in series process.

The experimental information (Reformate composition and output temperature) for each four reactors collected at different operating conditions was used to predict the parameters of the proposed kinetic model. The kinetic model involving 24 components, 1 to 11 carbon atoms for paraffins and 6 to 11 carbon atom for naphthenes and aromatics with 71 reactions. The pre-exponential Arrhenius constants and a

... Show More
View Publication Preview PDF