Preferred Language
Articles
/
0hegNY8BVTCNdQwCrWHd
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the effectiveness of the applied method was verified through an example.

Publication Date
Tue Feb 28 2023
Journal Name
Tropical Journal Of Natural Product Research
Genetic Association of Angiotensin-converting enzyme 2 ACE-2 (rs2285666) Polymorphism with the Susceptibility of COVID-19 Disease in Iraqi Patients
...Show More Authors

Significant risks to human health are posed by the 2019 coronavirus illness (COVID-19). SARS coronavirus type 2 receptor, also known as the major enzyme in the renin-angiotensin system (RAS), angiotensin-converting enzyme 2 (ACE-2), connects COVID-19 and RAS. This study was conducted with the intention of determining whether or not RAS gene polymorphisms and ACE-2 (G8790A) play a part in the process of predicting susceptibility to infection with COVID-19. In this study 127 participants, 67 of whom were deemed by a physician to be in a severe state of illness, and 60 of whom were categorized as "healthy controls" .The genetic study included an extraction of genomic DNA from blood samples of each covid 19 patients and healthy control

... Show More
View Publication
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Palarch’s Journal Of Archaeology Of Egypt/egyptology
Delivering an information resources service to users' homes to ensure Healthcare during COVID -19: Case study"
...Show More Authors

ABSTRACT University college libraries are one of the most important information institutions for all researchers during their research and study life, they seeks to provide information sources such as; books, periodicals, theses, databases, Inquiry service and answering questions services in various disciplines to achieve its goals. In 2020, college libraries of all types stepped up to meet the needs of their users' as they responded to the impacts of COVID-19, also extended necessary lifelines to community members facing job losses, healthcare crises, and remote work and learning during an unprecedented and uncertain time. The research aim to identifying the services provided to the postgraduate students users at University of Baghdad coll

... Show More
Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Integration Building Information Modeling and Lean Construction Technologies in the Iraqi Construction Sector: Benefits and Constraints
...Show More Authors

Building Information Modeling (BIM) and Lean Construction (LC) are two quickly growing applied research areas in construction management. This study focuses on identifying the most essential benefits and analyzing the most affecting constraints on the construction sector that construction players face as they attempt to combine BIM-LC in Iraqi construction. Experts assessed 30 benefits and 28 constraints from examining the previous literature, and a two-round Delphi survey formed the responses. Expert consensus analysis was utilized to elaborate and validate responses after descriptive statistical checks had been used for data processing.

According to the study's findings, the benefits include ensuring the most ef

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Anbar Journal Of Agricultural Sciences
THE GENETIC DIAGNOSIS OF THE BACTERIA ISOLATED FROM THE AGRICULTURAL SOIL SUSTAINED FARMS BY THE POLYMERASE CHAIN REACTION TECHNIQUE QPCR
...Show More Authors

The measurements and tests of the samples conducted in the laboratories of the College of Agriculture included isolating bio-fertilizers and testing the efficiency of isolates that fix atmospheric nitrogen and solubilize phosphorous compounds. Bacteria were isolated and identified from the rhizosphere soils of different plants collected from various agricultural areas. A total of 74 bacterial isolates were obtained based on the phenotypic characteristics of the developing colonies, as well as biochemical and microscopic traits. The results of isolation and identification showed that among the 74 bacterial isolates, there were 15 isolates of A. chroococcum, 13 of Az. lipoferum, 13 of B. megaterium, 10 of P. putida, 10 of Actinomycetes, and n

... Show More
View Publication
Scopus (9)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Variable Selection Using aModified Gibbs Sampler Algorithm with Application on Rock Strength Dataset
...Show More Authors

Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref