Preferred Language
Articles
/
PRYP54kBVTCNdQwC_o5G
Survey Study of Factional Order Controllers
...Show More Authors

This is a survey study that presents recent researches concerning factional controllers. It presents several types of fractional order controllers, which are extensions to their integer order counterparts. The fractional order PID controller has a dominant importance, so thirty-one paper are presented for this controller. The remaining types of controllers are presented according to the number of papers that handle them; they are fractional order sliding mode controller (nine papers), fuzzy fractional order sliding mode controller (five papers), fractional order lag-lead compensator (three papers), fractional order state feedback controller (three papers), fractional order fuzzy logic controller (three papers). Finally, several conclusions were drawn from the results that were given in this papers

Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research (ijsr)
The Linear Delay Fourth Order Eigen-Value Problems Solved By the Collocation Method
...Show More Authors

Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Accurate Four-Step Hybrid Block Method for Solving Higher-Order Initial Value Problems
...Show More Authors

This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Algorithm for nth Order Intgro-Differential Equations by Using Hermite Wavelets Functions
...Show More Authors

In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
View Publication
Crossref (14)
Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Journal Of Applied Mathematics
Order and Chaos in a Prey-Predator Model Incorporating Refuge, Disease, and Harvesting
...Show More Authors

In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The extent of the contribution of internal marketing in the management of human talent survey study of the views of some administrative leaders at the University of Mosul
...Show More Authors

 Abstract

Investment in the human resource has become an important part of the strategies of educational organizations so that they can be competitive, so that the access of academics in universities to the international awards as a result of their research excellence indicates the effectiveness of this human talent so the interest has emerged in the implementation of a strategy to manage these human talent in organizations in general and educational ones In particular as one of the power sources  that can not be imitated. The focus of the organization on the interaction between the working people has increased attention to the human element in order to achieve the desired quality levels, which called for organi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Al–bahith Al–a'alami
A Dubbed Turkish Drama and their Effects of the Behavior of Algerian Women: A Survey Study of a Sample of Women – The City of Mesila is a Model
...Show More Authors

The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In order to achieve these goals, the researcher relies on the descriptive approach in addition to the questionnaire and interviews to collect data. It ends with a number of results such as: The study aims to identify the effects of dubbed Turkish drama on the public through the application of a sample of the views of women. The study also attempts to monitor the causes and motives due to the act of observation and to identify the various effects of this act. In ord

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A General Overview on the Categories of Image Features Extraction Techniques: A Survey
...Show More Authors

In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Mon Feb 28 2022
Journal Name
Gsc Biological And Pharmaceutical Sciences
Survey of some plant for the Razzaza Lake and adjacent areas in Iraq
...Show More Authors

The study showed that there are (28) plant families present in Al-Razzaza Lake. The families are (Amaranthaceae, Amaryllidaceae, Aizoaceae, Apiaceae, Apocynaceae, Asteraceae, Brassicaceae, Boraginaceae, Capparaceae, Caryophyllaceae, Cistaceae, Colchicaceae, Convolvulaceae, Cynomoriaceae, Fabaceae, Frankeniaceae, Lamiaceae, Liliaceae, Malvaceae, Orobanchaceae, Plantaginaceae, Poaceae, Polygonaceae, Ranunculaceae, Solanaceae, Tamaricaceae,Typhaceae, Zygophyllaceae). Asteraceae family is the largest number of species found in abundance in this lake, followed by the Fabaceae family.

View Publication
Crossref