Preferred Language
Articles
/
vxdINo8BVTCNdQwCB2LO
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as the multi-objective first time as unsupervised Feature Selection (WDOFS) and the second time as a Clustering algorithm (WDOC). For example, the WDOC outperformed Harmony Search and Particle Swarm in terms of F-measurement by 93.3%; in contrast, text clustering's performance improves 0.9% because of using suggested clustering on the proposed feature selection. With WDOFS more than 50 percent of features have been removed from the other examination of features. The best result got the multi-objectives with F-measurement 98.3%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Model of Wind Turbine Power Control System with Fuzzy Regulation by Mamdani and Larsen Algorithms
...Show More Authors

Abstract 

     The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of  the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 26 2017
Journal Name
International Journal Of Pure And Applied Mathematics
ON CONVEX FUNCTIONS, $E$-CONVEX FUNCTIONS AND THEIR GENERALIZATIONS: APPLICATIONS TO NON-LINEAR OPTIMIZATION PROBLEMS
...Show More Authors

Contents IJPAM: Volume 116, No. 3 (2017)

View Publication
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sat Oct 08 2022
Journal Name
Journal Of Computational Design And Engineering
Twisted-fin parametric study to enhance the solidification performance of phase-change material in a shell-and-tube latent heat thermal energy storage system
...Show More Authors
Abstract<p>Phase change material (PCM) is considered as one of the most effective thermal energy storage (TES) systems to balance energy supply and demand. A key challenge in designing efficient PCM-based TES systems lies in the enhancement of heat transmission during phase transition. This study numerically examines the privilege of employing twisted-fin arrays inside a shell-and-tube latent heat storage unit to improve the solidification performance. The presence of twisted fins contributes to the dominating role of heat conduction by their curved shapes, which restricts the role of natural convection but largely aids the overall heat-transfer process during solidification. The heat-discharge </p> ... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Deterministic Analysis of Wind Loads Effects on High-Rise Buildings
...Show More Authors

This paper studies the effect of mean wind velocity on tall building. Wind velocity, wind profile and wind pressure have been considered as a deterministic phenomenon. Wind velocity has been modelled as a half-sinusoidal wave. Three exposures have been studied B, C, and D. Wind pressure was evaluated by equation that joined wind pressure with mean wind velocity, air density, and drag coefficient.

Variations of dynamic load factor for building tip displacement and building base shear were studied for different building heights, different mode shapes, different terrain exposures, and different aspect ratios of building plan. SAP software, has been used in modelling and dynamic analysis for all case studies.

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Evergreen
Development, Validation, and Performance Evaluation of An Air-Driven Free-Piston Linear Expander Numerical Model
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Visible-Light-driven Photocatalytic Properties of Copper(I) Oxide (Cu2O) and Its Graphene-based Nanocomposites
...Show More Authors

In this study, an improved process was proposed for the synthesis of structure-controlled Cu2O nanoparticles, using a simplified wet chemical method at room temperature. A chemical solution route was established to synthesize Cu2O crystals with various sizes and morphologies. The structure, morphology, and optical properties of Cu2O nanoparticles were analyzed by X-ray diffraction, SEM (scanning electron microscope), and UV-Vis spectroscopy. By adjusting the aqueous mixture solutions of NaOH and NH2OH•HCl, the synthesis of Cu2O crystals with different morphology and size could be realized. Strangely, it was found that the change in the ratio of de-ionized water and NaOH aqueous solution led to the synthesis of Cu2O crystals of differen

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (17)
Scopus Crossref
Publication Date
Wed Oct 12 2022
Journal Name
College Of Islamic Sciences
The Concept of the Text, its Divisions, Connotations, and Methodology
...Show More Authors

The text has many connotations in the Arabic language, such as vowel points, designation, completion, etc., and the original meaning of the text is to show. The Western text has its owen independent semantic unit .The biblical texts are a mixture of what was reported by the Prophet Moses (peace be upon him) and what the authors described in terms of texts over many centuries.The meaning of the text is guidance and payment, and it is a natural connotation. The religious text for Muslims is divided into peremptory texts that are national proof. The evidence for the meaning of the text is proven by language, and it is not required that the researcher be a jurist. The approach is a factual questionnaire by the researcher according to a speci

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref