Preferred Language
Articles
/
joe-501
Optimum Design of Power System Stabilizer based on Improved Ant Colony Optimization Algorithm
...Show More Authors

This paper presents an improved technique on Ant Colony Optimization (ACO) algorithm. The procedure is applied on Single Machine with Infinite Bus (SMIB) system with power system stabilizer (PSS) at three different loading regimes. The simulations are made by using MATLAB software. The results show that by using Improved Ant Colony Optimization (IACO) the system will give better performance with less number of iterations as it compared with a previous modification on ACO. In addition, the probability of selecting the arc depends on the best ant performance and the evaporation rate.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 27 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi Journal Of Physics
Thermoelectric power for thermally deposited cadmium telluride films
...Show More Authors

Thermal evaporation method has used for depositing CdTe films
on corning glass slides under vacuum of about 10-5mbar. The
thicknesses of the prepared films are400 and 1000 nm. The prepared
films annealed at 573 K. The structural of CdTe powder and prepared
films investigated. The hopping and thermal energies of as deposited
and annealed CdTe films studied as a function of thickness. A
polycrystalline structure observed for CdTe powder and prepared
films. All prepared films are p-type semiconductor. The hopping
energy decreased as thickness increased, while thermal energy
increased.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
power and chinese Abilities development after cold war
...Show More Authors

Abstract: This research deals with the developing of power and different abilities (military, security, economy, technology and scientific excellence) The research shows that the excellence of the Chinese economy and its development , had a positive reflection on the other powers and abilities , it means it is a base of development in all fields. The development in power and Chinese military abilities had a clear effect on Chinese strategic creed , and that what the research deals with in some details. The research also deals with developing Chinese nuclear abilities. The research doesn't ignore the security eye that indicates to the protection of the state sovereignty, concentrating on the unity and safety Chinese lands. The res

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Lecture Notes In Networks And Systems
Single-Bit Architecture for Low Power IoT Applications
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Electron Contribution to Stopping Power in Burning Plasma
...Show More Authors

The dependence of the energy losses or the stopping power for the energies and the related penetrating factor are arrive by using a theoretical approximation models. in this work we reach a compatible agreement between our results and the corresponding experimental results.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimizing Viscous Flow in Pipes Through Improved Flow Conditions and Chemical Injections
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
2022 International Conference On Data Science And Intelligent Computing (icdsic)
An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction
...Show More Authors

In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref