Preferred Language
Articles
/
kRfFgJEBVTCNdQwCu5Wp
Solution of Riccati matrix differential equation using new approach of variational ‎iteration method
...Show More Authors

To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was ‎proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the ‎exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the ‎modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact ‎solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which ‎shows the reliability and applicability of the proposed approach. ‎

Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
The Classical Continuous Mixed Optimal Control of Couple Nonlinear Parabolic Partial Differential Equations with State Constraints
...Show More Authors

In this work, the classical continuous mixed optimal control vector (CCMOPCV) problem of couple nonlinear partial differential equations of parabolic (CNLPPDEs) type with state constraints (STCO) is studied. The existence and uniqueness theorem (EXUNTh) of the state vector solution (SVES) of the CNLPPDEs for a given CCMCV is demonstrated via the method of Galerkin (MGA). The EXUNTh of the CCMOPCV ruled with the CNLPPDEs is proved. The Frechet derivative (FÉDE) is obtained. Finally, both the necessary and the sufficient theorem conditions for optimality (NOPC and SOPC) of the CCMOPCV with state constraints (STCOs) are proved through using the Kuhn-Tucker-Lagrange (KUTULA) multipliers theorem (KUTULATH).

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 20 2025
Journal Name
Journal Of Administration And Economics
Using the Maximum Likelihood Method with a Suggested Weight to Estimate the Effect of Some Pollutants on the Tigris River- City of Kut
...Show More Authors

The aim of this research is to use robust technique by trimming, as the analysis of maximum likelihood (ML) often fails in the case of outliers in the studied phenomenon. Where the (MLE) will lose its advantages because of the bad influence caused by the Outliers. In order to address this problem, new statistical methods have been developed so as not to be affected by the outliers. These methods have robustness or resistance. Therefore, maximum trimmed likelihood: (MTL) is a good alternative to achieve more results. Acceptability and analogies, but weights can be used to increase the efficiency of the resulting capacities and to increase the strength of the estimate using the maximum weighted trimmed likelihood (MWTL). In order to perform t

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Physics
Effect of Silver Nanoparticles on Fluorescence Intensity of Fluoreseina Dye Mixed in One Solution
...Show More Authors

Metal enhanced fluorescence (MEF) is an unequaled phenomenon of metal nanoparticle surface plasmons, when light interacts with the metal nanostructures (silver nanoparticles) which result electromagnetic fields to promote the sensitivity of fluorescence. This work endeavor to study the influence of silver nanoparticles on fluorescence intensity of Fluoreseina dye by employment mixture solution with different mixing ratio. Silver nanoparticles had been manufactured by the chemical reduction method so that Ag NP layer coating had been done by hot rotation liquid method. The optical properties of the prepared samples (mixture solution of Fluoreseina dye solutions and colloidal solution with 5 minutes prepared of Ag NPs) tested by using UV-V

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Effect of (1,4) phenylenediamine on the corrosion of lead in 1M hydrochloric acid solution
...Show More Authors

The accelerating effect of 1,4- phenylenediamine (PDA) additions in 1M hydrochloric acid solution at temperature rang (20-60) C° has been studied by weight losses measurement during ranging time (1-260) h and by following the pb2+ concentration in solution after several times by using Atomic absorption spectroscopy (AAS) . The volume of hydrogen gas involving was followed also in presence and absence of (PDA) in the corrosive solution .Accelerating enhanced by adding (NaCl , NaBr , NaI ) was also investigated.

View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2009
Journal Name
Iraqi Journal Of Science, Supplement 0f 2009
THE RELATIVE QUANTUM EFFICIENCY OF ANTHRACENE SOLUTION AS A FUNCTION OF LIGHT EXPOSURE DURATION
...Show More Authors

Abstract In this paper the effect of light exposure duration on Anthracene solution in chloroform is studied. It is found that: the Anthracene solution change its color when it is exposed to light, and that its relative quantum efficiency, Φ, decreases as the light exposure duration, t, increases and this govern by following empirical equation:- Φ = 0.7918-0.0762 In (t)

Preview PDF
Publication Date
Mon Sep 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effects of Thiourea on the Corrosion of Low Carbon Steel in Hydrochloric Acid Solution
...Show More Authors

The c.orrosion rate of  low carbon  steel  in 4M  hydrochlwic acid with and without  presence of thiourea has b.een studied  by gravimetric ahd gasometric methods  over the temperature range 303-333 K.

 

The percentage protection of steel increases  vvith the decrease of thimuea concentrations at  various  temperature range  303-333 K and

approaching highest  protection  (86.82%) at 303K  by using  I X 1 o-4 M

of thiourea. The high concentration .of thiourea  ( lxlo-3 M), enl1ances.

the  corrosion rates and  act  as dcpolariser for  the hydrogen  evolution

reaction,&n

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2013
Journal Name
Diyala Journal For Pure Sciences
Multipole Mixing Ratios for Gamma transitions in 56Fe populated in Reaction by using least square fitting method .
...Show More Authors

The γ- mixing ratios of γ- transitions from levels of 56Fe populated in reaction are calculated using least square fitting program for the first time in the case of pure and mixed transitions the results obtained have been compound with γ Values determined by other methods .The comparison shows that the agreement is good this confirmed the valilety of this method in calculating of values for such γ- transitions key word: γ- transition ,Multipole mixing ratios ,Least square fitting method.

Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
A Smishing Detection Method Based on SMS Contents Analysis and URL Inspection Using Google Engine and VirusTotal
...Show More Authors

    Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref