Preferred Language
Articles
/
joe-1950
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF) algorithm is designed so that the chemotaxis phase of bacteria represents the exploration part of the search operation. In contrast, the SDA represents the exploitation part.

Additionally, to improve search operation efficiency, the spiral model's radius and angular displacement are adaptively set according to a linear correlation concerning the fitness value. An additional phase, the elimination and dispersal phase, is obtained from BFA and added to the end of the SDA. This phase aims to improve the algorithm's final solution's accuracy by enhancing the algorithm's search strategy and performance. Simulation tests are run on unimodal and multimodal standard benchmark functions to verify the proposed algorithm. The proposed algorithm significantly outperforms SDA and Adaptive SDA (ASDA) algorithms regarding fitness value and accuracy.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The elements of the global tolerance and its impact on peace
...Show More Authors

The achievement of world peace is a humanitarian demand that humanity has sought since its existence. Despite the international and regional efforts to achieve this demand, it is still reaching its desired ambitions if conflicts, contradictions, and internal and external wars continue to justify us clearly in terms of ethnic, religious and sectarian conflict. The revolution of informatics and the impact of globalization opened a new era of communication and openness and the negative and positive impact of others, which re-published and distributed values, ideas and new cultures Some of them carries extremist ideas urging violence and destruction and other abolition, it became necessary to follow policies and reward The culture of peace,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 23 2022
Journal Name
International Journal Of Molecular Sciences
Physoxia Influences Global and Gene-Specific Methylation in Pluripotent Stem Cells
...Show More Authors

Pluripotent stem cells (PSC) possess unlimited proliferation, self-renewal, and a differentiation capacity spanning all germ layers. Appropriate culture conditions are important for the maintenance of self-renewal, pluripotency, proliferation, differentiation, and epigenetic states. Oxygen concentrations vary across different human tissues depending on precise cell location and proximity to vascularisation. The bulk of PSC culture-based research is performed in a physiologically hyperoxic, air oxygen (21% O2) environment, with numerous reports now detailing the impact of a physiologic normoxia (physoxia), low oxygen culture in the maintenance of stemness, survival, morphology, proliferation, differentiation potential, and epigenetic

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Pure And Applied Microbiology
Mixture Design of Experiments for the Optimization of Carbon Source for Promoting Undecylprodigiosin and Actinorhodin Production
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Calculate the sum of squares for parts (vehicles) SSE in 2n global trials with total integration In a suggested manne
...Show More Authors
In order to serve the field of knowledge in the field of design and analysis of experiments by adopting formulas and methods that are easy and simple in arithmetic work, especially in experiments that require many calculations for squares, including tests of type
... Show More
View Publication
Crossref
Publication Date
Sun Oct 10 2021
Journal Name
Journal Of Physics
A novel kite cross hexagonal search algorithm for fast block motion estimation
...Show More Authors

The performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Aug 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Online 3D path planning for Tri-copter drone using GWO-IBA algorithm
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Ieee Transactions On Intelligent Transportation Systems
Real-Time Intersection-Based Segment Aware Routing Algorithm for Urban Vehicular Networks
...Show More Authors

High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination

... Show More
View Publication
Scopus (69)
Crossref (62)
Scopus Clarivate Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
A Genetic Algorithm for Task Allocation Problem in the Internet of Things
...Show More Authors

In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic

... Show More
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref