To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which shows the reliability and applicability of the proposed approach.
In this work, the classical continuous mixed optimal control vector (CCMOPCV) problem of couple nonlinear partial differential equations of parabolic (CNLPPDEs) type with state constraints (STCO) is studied. The existence and uniqueness theorem (EXUNTh) of the state vector solution (SVES) of the CNLPPDEs for a given CCMCV is demonstrated via the method of Galerkin (MGA). The EXUNTh of the CCMOPCV ruled with the CNLPPDEs is proved. The Frechet derivative (FÉDE) is obtained. Finally, both the necessary and the sufficient theorem conditions for optimality (NOPC and SOPC) of the CCMOPCV with state constraints (STCOs) are proved through using the Kuhn-Tucker-Lagrange (KUTULA) multipliers theorem (KUTULATH).
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t
... Show MoreMetal enhanced fluorescence (MEF) is an unequaled phenomenon of metal nanoparticle surface plasmons, when light interacts with the metal nanostructures (silver nanoparticles) which result electromagnetic fields to promote the sensitivity of fluorescence. This work endeavor to study the influence of silver nanoparticles on fluorescence intensity of Fluoreseina dye by employment mixture solution with different mixing ratio. Silver nanoparticles had been manufactured by the chemical reduction method so that Ag NP layer coating had been done by hot rotation liquid method. The optical properties of the prepared samples (mixture solution of Fluoreseina dye solutions and colloidal solution with 5 minutes prepared of Ag NPs) tested by using UV-V
... Show MoreThe accelerating effect of 1,4- phenylenediamine (PDA) additions in 1M hydrochloric acid solution at temperature rang (20-60) C° has been studied by weight losses measurement during ranging time (1-260) h and by following the pb2+ concentration in solution after several times by using Atomic absorption spectroscopy (AAS) . The volume of hydrogen gas involving was followed also in presence and absence of (PDA) in the corrosive solution .Accelerating enhanced by adding (NaCl , NaBr , NaI ) was also investigated.
Abstract In this paper the effect of light exposure duration on Anthracene solution in chloroform is studied. It is found that: the Anthracene solution change its color when it is exposed to light, and that its relative quantum efficiency, Φ, decreases as the light exposure duration, t, increases and this govern by following empirical equation:- Φ = 0.7918-0.0762 In (t)
The c.orrosion rate of low carbon steel in 4M hydrochlwic acid with and without presence of thiourea has b.een studied by gravimetric ahd gasometric methods over the temperature range 303-333 K.
The percentage protection of steel increases vvith the decrease of thimuea concentrations at various temperature range 303-333 K and
approaching highest protection (86.82%) at 303K by using I X 1 o-4 M
of thiourea. The high concentration .of thiourea ( lxlo-3 M), enl1ances.
the corrosion rates and act as dcpolariser for the hydrogen evolution
reaction,&n
... Show MoreThe γ- mixing ratios of γ- transitions from levels of 56Fe populated in reaction are calculated using least square fitting program for the first time in the case of pure and mixed transitions the results obtained have been compound with γ Values determined by other methods .The comparison shows that the agreement is good this confirmed the valilety of this method in calculating of values for such γ- transitions key word: γ- transition ,Multipole mixing ratios ,Least square fitting method.
In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show More