Preferred Language
Articles
/
pBbuCocBVTCNdQwCojK2
Gamipog: A deterministic genetic multi-parameter-order strategy for the generation of variabLE STRENGTH COVERING ARRAYS
...Show More Authors

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 03 2021
Journal Name
Entropy
Reliable Recurrence Algorithm for High-Order Krawtchouk Polynomials
...Show More Authors

Krawtchouk polynomials (KPs) and their moments are promising techniques for applications of information theory, coding theory, and signal processing. This is due to the special capabilities of KPs in feature extraction and classification processes. The main challenge in existing KPs recurrence algorithms is that of numerical errors, which occur during the computation of the coefficients in large polynomial sizes, particularly when the KP parameter (p) values deviate away from 0.5 to 0 and 1. To this end, this paper proposes a new recurrence relation in order to compute the coefficients of KPs in high orders. In particular, this paper discusses the development of a new algorithm and presents a new mathematical model for computing the

... Show More
View Publication
Scopus (35)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Mon Apr 18 2022
The modeling techniques of the second‐order correlation function <i>g</i> <sup>(2)</sup> ( <i>τ</i> ) for a quantum emitter
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Nov 12 2014
Journal Name
Wireless Personal Communications
A Multi-objective Disjoint Set Covers for Reliable Lifetime Maximization of Wireless Sensor Networks
...Show More Authors

View Publication
Scopus (19)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Design of Multi-Rate Multi-Zone Wireless Fuzzy Temperature Control System for Greenhouse Application
...Show More Authors

sensor sampling rate (SSR) may be an effective and crucial field in networked control systems.  Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
A Survey on Image Caption Generation in Various Languages
...Show More Authors

      The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Strategy formulation for Missan Oil Company for the years 2020-2024
...Show More Authors

     The research problem revolves around the failure of Maysan Oil Company to have a strategy that enables it to keep up with work in a mysterious and highly dynamic environment. Therefore, the research aims to present a proposed strategy that is comprehensive and realistic to the Maysan Oil Company for the next five years (2020-2024) based on the position and conditions of the company Current and future by adopting the scientific foundations for formulating the strategy, and the importance of research lies in the company's situational analysis to know its internal capabilities from strengths or weaknesses and diagnosing the surrounding elements of opportunities or threats so that this analysis represents a s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
A complete (48, 4)-arc in the Projective Plane Over the Field of Order Seventeen
...Show More Authors

            The article describes a certain computation method of -arcs to construct the number of distinct -arcs in  for . In this method, a new approach employed to compute the number of -arcs and the number of distinct arcs respectively. This approach is based on choosing the number of inequivalent classes } of -secant distributions that is the number of 4-secant, 3-secant, 2-secant, 1-secant and 0-secant in each process. The maximum size of -arc that has been constructed by this method is . The new method is a new tool to deal with the programming difficulties that sometimes may lead to programming problems represented by the increasing number of arcs. It is essential to reduce the established number of -arcs in each cons

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Feb 19 2022
Journal Name
Intelligent Service Robotics
Dynamic performance of a series elastic actuator with variable stiffness logarithmic spiral spring
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Thermal Buckling of Laminated Composite Plates Using a Simple Four Variable Plate Theory
...Show More Authors

In this study, the thermal buckling behavior of composite laminate plates cross-ply and angle-ply all edged simply supported subjected to a uniform temperature field is investigated, using a simple trigonometric shear deformation theory. Four unknown variables are involved in the theory, and satisfied the zero traction boundary condition on the surface without using shear correction factors, Hamilton's principle is used to derive equations of  motion depending on a Simple Four Variable Plate Theory for cross-ply and angle-ply, and then solved through Navier's double trigonometric sequence, to obtain critical buckling temperature for laminated composite plates. Effect of changing some design parameters such as, ortho

... Show More
View Publication Preview PDF
Crossref