Preferred Language
Articles
/
qBiYIpgBVTCNdQwC0bkm
A hybrid analytical method for fractional order Klein–Gordon and Burgers equations
...Show More Authors

Scopus
Publication Date
Tue Dec 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Hybrid compensation of polarization-multiplexed QPSK optical format for high bit rate networks
...Show More Authors

<span lang="EN-GB">Transmitting the highest capacity throughput over the longest possible distance without any regeneration stage is an important goal of any long-haul optical network system. Accordingly, Polarization-Multiplexed Quadrature Phase-Shift-Keying (PM-QPSK) was introduced lately to achieve high bit-rate with relatively high spectral efficiency. Unfortunately, the required broad bandwidth of PM-QPSK increases the linear and nonlinear impairments in the physical layer of the optical fiber network. Increased attention has been spent to compensate for these impairments in the last years. In this paper, Single Mode Fiber (SMF), single channel, PM-QPSK transceiver was simulated, with a mix of optical and electrical (Digi

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Controller for Nonlinear CSTR System based on Identification
...Show More Authors

This paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Apr 03 2025
Journal Name
Isa Transactions
Optimal hybrid type-3 fuzzy controller for horizontal axis wind turbines: Comparative study
...Show More Authors

The blade pitch angle (BPA) controller is key factor to improve the power generation of wind turbine (WT). Due to the aerodynamic structural behavior of the rotor blades, wind turbine system performance is influenced by pitch angle and environmental conditions such as wind speed, which fluctuate throughout the day. Therefore, to overcome the pitch angle control (PAC) problem, high wind speed conditions, and due to type-1 and type-2 fuzzy logic limitations for handling high levels of uncertainty, the newly proposed optimal hybrid type-3 fuzzy logic controller has been applied and compared since type-3 fuzzy controllers utilize three-dimensional membership functions, unlike type-2 and type-1 fuzzy logic controllers. In this paper six differen

... Show More
View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu May 01 1997
Journal Name
Polymer-plastics Technology And Engineering
An Efficient Method for Real Gas Pseudopressure Calculation
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Solving the created ordinary differential equations from Lomax distribution
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Apr 04 2023
Journal Name
Results In Nonlinear Analysis
The fractional integrodifferential operator and its univalence and boundedness features according to Pre-Schwarzian derivative structure
...Show More Authors

Complex-valued regular functions that are normalized in the open unit disk are vastly studied. The current study introduces a new fractional integrodifferential (non-linear) operator. Based on the pre-Schwarzian derivative, certain appropriate stipulations on the parameters included in this con-structed operator to be univalent and bounded are investigated and determined.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed May 19 2010
Journal Name
Journal Of College Of Science, University Of Babylon
H-Point Standard Addition Method for Simultaneous Determination of Cimetidine and Erythromycin Ethylsuccinate Drugs Using Bromothymol Blue as a Chromogenic Complexing Agent
...Show More Authors

The H-Point Standard Addition Method (H-PSAM) has been applied for spectrophotometric simultaneous determination of Cimetidine and Erythromycin ethylsuccinate using Bromothymol Blue (BTB) as a chromogenic complexing agent in a buffer solution at pH 5.5.

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Al–bahith Al–a'alami
Analytical Study of Cartoon picture AL-Mada Newspaper is a model
...Show More Authors

The researcher studies and explains the content of some pictures that are published in al-Mada newspaper. The research is important as it deals with a topic that has a relation with visual culture and its role to transfer the press letter to the audience. The researcher finds that cartoonist exposed the security services through important people who have a major role in state policy and reveals the level of corruption and the weak treatments for this phenomenon and its reflection on the whole society and individuals. In addition to that, cartoonists try to encourage the public for going on the peaceful demonstrations since it is a good tool to make pressure on the government to punish the corrupts.

View Publication Preview PDF
Crossref