Preferred Language
Articles
/
bsj-2019
An Algorithm for nth Order Intgro-Differential Equations by Using Hermite Wavelets Functions
...Show More Authors

In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Engineering Research And Advanced Technology
The Use of First Order Polynomial with Double Scalar Quantization for Image Compression
...Show More Authors

Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
Recent modification of Homotopy perturbation method for solving system of third order PDEs
...Show More Authors

This paper presents new modification of HPM to solve system of 3 rd order PDEs with initial condition, for finding suitable accurate solutions in a wider domain.

Scopus (19)
Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Proceeding Of The 1st International Conference On Recent Trends Of Engineering Sciences And Sustainability
Design of a Fractional Order Sliding Mode Controller for Twin Rotor Aerodynamic System
...Show More Authors

This paper proposes a new structure for a Fractional Order Sliding Mode Controller (FOSMC) to control a Twin Rotor Aerodynamic System (TRAS). The new structure is composed by defining two 3-dimensional sliding mode surfaces for the TRAS model and introducing fractional order derivative integral in the state variables as well as in the control action. The parameters of the controller are determined so as to minimize the Integral of Time multiplied by Absolute Error (ITAE) performance index. Through comparison, this controller outperforms its integer counterpart in many specifications, such as reducing the delay time, rise time, percentage overshoot, settling time, time to reach the sliding surface, and amplitude of chattering in control inpu

... Show More
Publication Date
Mon Jan 29 2024
Journal Name
Advances In Systems Analysis, Software Engineering, And High Performance Computing
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%,

... Show More
View Publication
Crossref (14)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Iecon 2017 - 43rd Annual Conference Of The Ieee Industrial Electronics Society
Optimal second order integral sliding mode control for a flexible joint robot manipulator
...Show More Authors

The flexible joint robot manipulators provide various benefits, but also present many control challenges such as nonlinearities, strong coupling, vibration, etc. This paper proposes optimal second order integral sliding mode control (OSOISMC) for a single link flexible joint manipulator to achieve robust and smooth performance. Firstly, the integral sliding mode control is designed, which consists of a linear quadratic regulator (LQR) as a nominal control, and switching control. This control guarantees the system robustness for the entire process. Then, a nonsingularterminal sliding surface is added to give a second order integral sliding mode control (SOISMC), which reduces chartering effect and gives the finite time convergence as well. S

... Show More
View Publication
Scopus (13)
Crossref (9)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref