Preferred Language
Articles
/
uhdWOI8BVTCNdQwCjWM_
Optimization of IPv6 Protocol Independent Multicast-Sparse Mode Multicast Routing Protocol based on Greedy Rendezvous Point Selection Algorithm
...Show More Authors

Crossref
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Speed Controller of Three Phase Induction Motor Using Sliding Mode Controller
...Show More Authors

In this paper, an adaptive integral Sliding Mode Control (SMC) is employed to control the speed of Three-Phase Induction Motor. The strategy used is the field oriented control as ac drive system. The SMC is used to estimate the frequency that required to generates three phase voltage of Space Vector Pulse Width Modulation (SVPWM) invertor . When the SMC is used with current controller, the quadratic component of stator current is estimated by the controller. Instead of using current controller, this paper proposed estimating the frequency of stator voltage since that the slip speed is function of the quadratic current . The simulation results of using the SMC showed that a good dynamic response can be obtained under load

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Ieee Transactions On Industrial Electronics
Finite-Time Continuous Terminal Sliding Mode Control of Servo Motor Systems
...Show More Authors

In this article, a continuous terminal sliding mode control algorithm is proposed for servo motor systems. A novel full-order terminal sliding mode surface is proposed based on the bilimit homogeneous property, such that the sliding motion is finite-time stable independent of the system’s initial condition. A new continuous terminal sliding mode control algorithm is proposed to guarantee that the system states reach the sliding surface in finitetime. Not only the robustness is guaranteed by the proposed controller but also the continuity makes the control algorithm more suitable for the servo mechanical systems. Finally, a numerical example is presented to depict the advantages of the proposed control algorithm. An application in the rota

... Show More
View Publication
Scopus (224)
Crossref (200)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Laser
Hong-Ou-Mandel Dip Measurements of Two Independent Weak Coherent Pulses for Free Space Quantum Key Distribution Systems
...Show More Authors

Preparation of identical independent photons is the core of many quantum applications such as entanglement swapping and entangling process. In this work, Hong-Ou-Mandel experiment was performed to evaluate the degree of indistinguishability between independent photons generated from two independent weak coherent sources working at 640 nm. The visibility was 46%, close to the theoretical limit of 50%. The implemented setup can be adopted in quantum key distribution experiments carried out with free space as the channel link, as all the devices and components used are operative in the visible range of the electromagnetic spectrum.

View Publication Preview PDF
Publication Date
Fri Apr 07 2017
Journal Name
Oncology Letters
AURKA mRNA expression is an independent predictor of poor prognosis in patients with non-small cell lung cancer
...Show More Authors

View Publication
Scopus (37)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sat Feb 15 2025
Journal Name
Experimental And Theoretical Nanotechnology
Analysis of applications of Banach fixed point theorem
...Show More Authors

In the context of normed space, Banach's fixed point theorem for mapping is studied in this paper. This idea is generalized in Banach's classical fixed-point theory. Fixed point theory explains many situations where maps provide great answers through an amazing combination of mathematical analysis. Picard- Lendell's theorem, Picard's theorem, implicit function theorem, and other results are created by other mathematicians later using this fixed-point theorem. We have come up with ideas that Banach's theorem can be used to easily deduce many well-known fixed-point theorems. Extending the Banach contraction principle to include metric space with modular spaces has been included in some recent research, the aim of study proves some pro

... Show More
View Publication
Scopus Crossref
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
The Effect of Tool Path Strategy on Twist Behavior In Single Point Incremental Sheet Metal Forming
...Show More Authors

In Incremental sheet metal forming process, one important step is to produce tool path, an
accurate tool path is one of the main challenge of incremental sheet metal forming
process. Various factors should be considered prior to generation of the tool path i.e.
mechanical properties of sheet metal, the holding mechanism, tool speed, feed rate and
tool size. In this work investigation studies have been carried out to find the different tool
path strategies to control the twist effect in the final product manufactured by single point
incremental sheet metal forming (SPIF), an adaptive tool path strategy was proposed and
examined for several Aluminum conical models. The comparison of the proposed tool path with t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Oct 01 2010
Journal Name
2010 Ieee Symposium On Industrial Electronics And Applications (isiea)
Effectiveness of the cumulative vs. normal mode of operation for combinatorial testing
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref