Preferred Language
Articles
/
KBhPhZgBVTCNdQwCib6w
Estimating an Exponentiated Expanded Power Function Distribution Using an Artificial Intelligence Algorithm
...Show More Authors

The distribution of the expanded exponentiated power function EEPF with four parameters, was presented by the exponentiated expanded method using the expanded distribution of the power function, This method is characterized by obtaining a new distribution belonging to the exponential family, as we obtained the survival rate and failure rate function for this distribution, Some mathematical properties were found, then we used the developed least squares method to estimate the parameters using the genetic algorithm, and a Monte Carlo simulation study was conducted to evaluate the performance of estimations of possibility using the Genetic algorithm GA.

Publication Date
Fri Jan 01 2010
Journal Name
Iraqi Journal Of Science
RETRIEVING DOCUMENT WITH COMPACT GENETIC ALGORITHM(CGA)
...Show More Authors

Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Fri Jan 16 2026
Journal Name
F1000research
Update Quasi-Newton Algorithm for Training ANN
...Show More Authors

The proposed design of neural network in this article is based on new accurate approach for training by unconstrained optimization, especially update quasi-Newton methods are perhaps the most popular general-purpose algorithms. A limited memory BFGS algorithm is presented for solving large-scale symmetric nonlinear equations, where a line search technique without derivative information is used. On each iteration, the updated approximations of Hessian matrix satisfy the quasi-Newton form, which traditionally served as the basis for quasi-Newton methods. On the basis of the quadratic model used in this article, we add a new update of quasi-Newton form. One innovative features of this form's is its ability to estimate the energy functio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 28 2026
Journal Name
Journal Of Physical Education
Criteria Some Power Defined By Speed Endurance In Youth Basketball
...Show More Authors

View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Stopping power and range calculations of protons in human tissues
...Show More Authors

In this research, the stopping power and range of protons in biological human soft and hard tissues (blood, brain, skeleton-cortical bone, and skin) of both child and adult are calculated at the energies ranging from 1MeV to 350 MeV. The data is collected from ICRU Report 46 and calculated the stopping power employing the Bethe formula. Moreover, the simple integration (continuous slowing down approximation) method is employed for calculating protons range at the target. Then, the stopping power and range of protons value in human tissues have been compared with the program called SRIM. Moreover, the results of the stopping power vs energy and the range vs energy have been presented graphically. Proper agreement is found between the gain

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
Chinese power challenge of becoming historical sites in the course
...Show More Authors

China occupies an area of 906 million square km. and lies east Asia. Its population approximately 1,388 people, according to census 2010. China was a global great power for centuries , then shrank its jurisdiction and occupied by European countries and Japan in the 19th century. It regained its strength and independence under the leadership and rule of the Chinese Communist Party since 1949. In the 21st century , the Chinese positions has risen universally due to its achievements in the economic and trade affairs . Nowadays, China became a largest exporting state in the world and a second economic power after USA.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 05 2013
Journal Name
Journal Of Intelligent Material Systems And Structures
Increasing the power of piezoelectric energy harvesters by magnetic stiffening
...Show More Authors

A piezoelectric cantilever beam with a tip mass at its free end is a common energy harvester configuration. This article introduces a new principle of designing such a harvester that increases the generated power without changing the resonance frequency of the harvester: the attraction force between two permanent magnets is used to add stiffness to the system. This magnetic stiffening counters the effect of the tip mass on the efficient operation frequency. Five set-ups incorporating piezoelectric bimorph cantilevers of the same type in different mechanical configurations are compared theoretically and experimentally to investigate the feasibility of this principle: theoretical and experimental results show that magnetically stiffened harve

... Show More
View Publication
Scopus (13)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2025
Journal Name
Ieee
Securing Power Microgrids: A Cyber-Physical Approach for Modern Infrastructure
...Show More Authors

With the increasing reliance on microgrids as flexible and sustainable solutions for energy distribution, securing decentralized electricity grids requires robust cybersecurity strategies tailored to microgrid-specific vulnerabilities. The research paper focuses on enhancing detection capabilities and response times in the face of coordinated cyber threats in microgrid systems by implementing advanced technologies, thereby supporting decentralized operations while maintaining robust system performance in the presence of attacks. It utilizes advanced power engineering techniques to strengthen cybersecurity in modern power grids. A real-world CPS testbed was utilized to simulate the smart grid environment and analyze the impact of cyberattack

... Show More