Preferred Language
Articles
/
joe-2043
A Modified Strength Pareto Evolutionary Algorithm 2 based Environmental /Economic Power Dispatch
...Show More Authors

A Strength Pareto Evolutionary Algorithm 2 (SPEA 2) approach for solving the multi-objective Environmental / Economic Power Dispatch (EEPD) problem is presented in this paper. In the past fuel cost consumption minimization was the aim (a single objective function) of economic power dispatch problem. Since the clean air act amendments have been applied to reduce SO2 and NOX emissions from power plants, the utilities change their strategies in order to reduce pollution and atmospheric emission as well, adding emission minimization as other objective function made economic power dispatch (EPD) a multi-objective problem having conflicting objectives. SPEA2 is the improved version of SPEA with better fitness assignment, density estimation, and modified archive truncation. In addition fuzzy set theory is employed to extract the best compromise solution. Several optimization run of the proposed method are carried out on 3-units system and 6-units standard IEEE 30-bus test system. The results demonstrate the capabilities of the proposed method to generate well-distributed Pareto-optimal non-dominated feasible solutions in single run. The comparison with other multi-objective methods demonstrates the superiority of the proposed method.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 07 2022
Journal Name
Cogent Engineering
A partial image encryption scheme based on DWT and texture segmentation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Multiplier free FPGA based OFDM Transmitter
...Show More Authors

Orthogonal Frequency Division Multiplexing (OFDM) is an efficient multi-carrier technique.The core operation in the OFDM systems is the FFT/IFFT unit that requires a large amount of hardware resources and processing delay. The developments in implementation techniques likes Field Programmable Gate Array (FPGA) technologies have made OFDM a feasible option. The goal of this paper is to design and implement an OFDM transmitter based on Altera FPGA using Quartus software. The proposed transmitter is carried out to simplify the Fourier transform calculation by using decoder instead of multipliers. After programming ALTERA DE2 FPGA kit with implemented project, several practical tests have been done starting from monitoring all the results of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet-Based Feature Extraction for Cassava Classification: A Machine Learning Approach
...Show More Authors

Cassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Wed May 13 2015
Journal Name
Elsevier Procedia Economics And Finance
The Role of FDI Inflows in Economic Growth in Malaysia (Time Series: 1975-2010)
...Show More Authors

Recently, Malaysia has been recognized as one of the most popular destinations for Foreign Direct Investment (FDI) in Southeast Asia. But how do these FDI inflows affect Malaysia economy? This paper aims to identify the role of FDI inflows in Malaysia economic growth through a proposed endogenous growth model. Annual data covers from 1975 to 2010. Unit root test and Johansen Co-integration test are adopted to respectively verify the time series data is stable and the linear combination of the variables is stationary. Hierarchical Multiple Regressions (HMR) Analysis is then conducted to find out the momentum of the Malaysia economic growth including FDI inflows. The results show that the FDI inflows together with the human capital deve

... Show More
Publication Date
Thu Jan 02 2025
Journal Name
مجلة كلية القانون للعلوم القانونية والسياسية
Employment of Chinese Cyber Power in Regional Conflict Management Strategies The Case of Conflict with Japan After 2014
...Show More Authors

Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un

... Show More
View Publication
Publication Date
Wed Oct 28 2015
Journal Name
Journal Of Mathematics And System Science
Simulating Particle Swarm Optimization Algorithm to Estimate Likelihood Function of ARMA(1, 1) Model
...Show More Authors

Crossref
Publication Date
Sun Apr 03 2011
Journal Name
لمؤتمر العلمي الرابع لكلية التربية/ جامعة سامراء
A comparison between alanine aminopeptidase (AAP) activity in type 2 diabetes and diabetic cardiac patients.
...Show More Authors

Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Study on Viral Infection and Related Parameters in A Sample of Diabetes Mellitus Type 2
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Oct 20 2022
Journal Name
Nano Biomedicine And Engineering
DFT-Quantum Chemical and Experimental Studies of a New 2-(Substituted Thio) Furan as a Corrosion Inhibitor in Acidic Media
...Show More Authors

The corrosion inhibiting properties of the new furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione in acidic solution (1.0 M HCl) were explored utilizing electrochemical, surface morphology (AFM), and quantum chemical calculations approaches. The novel furan derivative 5-(furan-2-ylmethylsulfonyl-4-phenyl-2,4- dihydro [1,2,4] triazole-3-thione shows with an inhibitory efficiency value of 99.4 percent at 150 ppm, carbon steel corrosion in acidic medium is effectively inhibited, according to the results. The influence of temperature on corrosion prevention was studied using adsorption parameters and activation thermodynamics. The novel furan derivative creates a protective layer over the metallic surfa

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref