Preferred Language
Articles
/
joe-1950
An Improved Adaptive Spiral Dynamic Algorithm for Global Optimization
...Show More Authors

This paper proposes a new strategy to enhance the performance and accuracy of the Spiral dynamic algorithm (SDA) for use in solving real-world problems by hybridizing the SDA with the Bacterial Foraging optimization algorithm (BFA). The dynamic step size of SDA makes it a useful exploitation approach. However, it has limited exploration throughout the diversification phase, which results in getting trapped at local optima. The optimal initialization position for the SDA algorithm has been determined with the help of the chemotactic strategy of the BFA optimization algorithm, which has been utilized to improve the exploration approach of the SDA. The proposed Hybrid Adaptive Spiral Dynamic Bacterial Foraging (HASDBF) algorithm is designed so that the chemotaxis phase of bacteria represents the exploration part of the search operation. In contrast, the SDA represents the exploitation part.

Additionally, to improve search operation efficiency, the spiral model's radius and angular displacement are adaptively set according to a linear correlation concerning the fitness value. An additional phase, the elimination and dispersal phase, is obtained from BFA and added to the end of the SDA. This phase aims to improve the algorithm's final solution's accuracy by enhancing the algorithm's search strategy and performance. Simulation tests are run on unimodal and multimodal standard benchmark functions to verify the proposed algorithm. The proposed algorithm significantly outperforms SDA and Adaptive SDA (ASDA) algorithms regarding fitness value and accuracy.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Anemia Blood Cell localization Using Modified K- Means Algorithm
...Show More Authors

View Publication
Publication Date
Fri Sep 24 2021
Journal Name
Proceedings Of Sixth International Congress On Information And Communication Technology
Minimizing Costs of Transportation Problems Using the Genetic Algorithm
...Show More Authors

View Publication
Scopus (13)
Crossref (10)
Scopus Crossref
Publication Date
Wed Mar 23 2011
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Image Compression Using Proposed Enhanced Run Length Encoding Algorithm
...Show More Authors

In this paper, we will present proposed enhance process of image compression by using RLE algorithm. This proposed yield to decrease the size of compressing image, but the original method used primarily for compressing a binary images [1].Which will yield increasing the size of an original image mostly when used for color images. The test of an enhanced algorithm is performed on sample consists of ten BMP 24-bit true color images, building an application by using visual basic 6.0 to show the size after and before compression process and computing the compression ratio for RLE and for the enhanced RLE algorithm.

Preview PDF
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Photochemistry And Photobiology A: Chemistry
Improved photocatalytic degradation of methyl violet dye and pathogenic bacteria using g-C3N4 supported phosphotungstic acid heterojunction
...Show More Authors

Scopus (43)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Activated Carbon Preparation from Date Stones by Microwave Assisted K2CO3 Activation
...Show More Authors

The preparation of activated carbon (AC) from date stones by using microwave assisted K2CO3 activation was investigated in this paper. The influence of radiation time, radiation power, and impregnation ratio on the yield and methylene blue (MB) uptake of such carbon were studied. Based on Box-Wilson central composite design, two second order polynomial models were developed to correlate the process variables to the two responses. From the analysis of variance the significant variables on each response were identified. Optimum coditions of 8 min radiation time, 660 W radiation power and 1.5 g/g impregnation ratio gave 460.123 mg/g MB uptake and 19.99 % yield. The characteristics of the AC were examined by pore structure analysis, and scan

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Baghdad Science Journal
Optimization and Validation of RP-HPLC-UV/VIS Method for Determination Some Antioxidants in Dry Calyces of Iraqi Hibiscus Sabdraffia Linn
...Show More Authors

A new (Reversed Phase- High Performance Liquid chromatography) RP-HPLC method with Ultraviolet-Visible spectrophotometry has been optimized and validated for the simultaneous extraction and determination of antioxidants present in Iraqi calyces of Hibiscus Sabdraffia Linn. The method is based on using ultrasonic bath for extracting antioxidants. Limit of detection in μg/ml of Vitamin C, Sabdaretine, Gossypetine, Hibiscetine, Anthocyanins, Dephinidin-3-glucoside were113.8294×10-6,123.0453×10-6,70.3681×10-6,59.6730×10-6,148.1710×10-6,and125.3481×10-6 respectively. The concentration of antioxidants found in dry spacemen of calyces of Iraqi Hibiscus Sabdraffia Linn. under study: Vitamin C, Sabdaretine, Gossypetine, Hibiscetine, Anthoc

... Show More
View Publication Preview PDF
Crossref