Preferred Language
Articles
/
4BdnM48BVTCNdQwCJ2C-
Programming Exam Questions Classification Based On Bloom’s Taxonomy Using Grammatical Rule
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Performance of STBC Based MIMO-OFDM Using Pilot-aided Channel Estimation
...Show More Authors

Many studies have been published to address the growing issues in wireless communication systems. Space-Time Block Coding (STBC) is an effective and practical MIMO-OFDM application that can address such issues. It is a powerful tool for increasing wireless performance by coding data symbols and transmitting diversity using several antennas. The most significant challenge is to recover the transmitted signal through a time-varying multipath fading channel and obtain a precise channel estimation to recover the transmitted information symbols. This work considers different pilot patterns for channel estimation and equalization in MIMO-OFDM systems. The pilot patterns fall under two general types: comb and block types, with

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology & Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm
...Show More Authors

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 01 2023
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Comparison hybrid techniques-based mixed transform using compression and quality metrics
...Show More Authors

Image quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 20 2016
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Development Accounting Rule disclosure by accounting policies in the light of Islamic and electronic banking Activities (Proposal pattern): Proposal pattern
...Show More Authors

the bank sect for any country  is very important  because  its represent a major  nerve   to feed a verity economic and finance activities .development any state measure by development  banking  sets and its represent  important  factor to investors attract . and because  important  of this subject ,teen accounting rule is a specialized for it .its related by  Disclosures in the Financial Statements Of Banks and The Similar Institutions, its accredit  by auditing and accounting standard  consul in republic of Iraq.in date 10/28/1998.                      &

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
The Rights of the Non-Muslims During the Rule of the Prophet Mohammed and Rashidians Succession Theoretically With Historical Witnesses
...Show More Authors

(Thimma) in Arabic means compact, and immunity. (People of Thimma) are the free non-Muslim people under Muslim rule. This includes Heavenly Religions people, i. e., Christian and Jews).
They have been called (People of Thimma) because they had paid (Jizyah: tribute) so they became safe for their souls, honor, properties at the custody of Muslims.
Islamic law had posed (Jizyah: tribute) upon the Jews and Christians who were living under Muslim rule as a reaction of not embracing Islam Faith against securing their rights and freedom.
Freedoms secured by Islam for the (People of Thimma) had been many, including the right of faith, not coercing them to be Muslim, the right to live, to possess properties, protect and secure them, the

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Revue Académique De La Recherche Juridique
Compliance in Reality Television Programming Contracts -A Legal Study in light of the American Experience
...Show More Authors

The development of the television industry has led to the emergence of a new type of entertainment program in which producers have abandoned stereotypes in traditional programs, known as (Reality TV show). This type of program has spread rapidly in America, (where there are more than 40 series of these programs), as well as Europe and more than twenty countries around the world, including the Arab countries, where the number of these programs today to about 1000 programs and the number is increasing , Especially with the readiness of the production networks to produce more of these programs for the huge profits they derive from them (because of the high viewing rates and the large number of ads broadcast through them) in return for low prod

... Show More
View Publication