Preferred Language
Articles
/
ARgNx5QBVTCNdQwCiSCl
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 10 2022
Journal Name
Iraqi Journal Of Science
Genetic Algorithm based Clustering for Intrusion Detection
...Show More Authors

Clustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 21 2021
Journal Name
The 3rd Al-noor International Conference Of Science And Technology 2021 Muscat-oman
Gama Platform Survey for Agent-Based Modelling
...Show More Authors

The agent-based modeling is currently utilized extensively to analyze complex systems. It supported such growth, because it was able to convey distinct levels of interaction in a complex detailed environment. Meanwhile, agent-based models incline to be progressively complex. Thus, powerful modeling and simulation techniques are needed to address this rise in complexity. In recent years, a number of platforms for developing agent-based models have been developed. Actually, in most of the agents, often discrete representation of the environment, and one level of interaction are presented, where two or three are regarded hardly in various agent-based models. The key issue is that modellers work in these areas is not assisted by simulation plat

... Show More
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Fuzzy Based Clustering for Grayscale Image Steganalysis
...Show More Authors

Fuzzy Based Clustering for Grayscale Image Steganalysis

View Publication Preview PDF
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Engineering
Identifying Failure Factors in the Implementation of Residential Complex Projects in Iraq
...Show More Authors

Residential complexes have witnessed a great demand in most countries worldwide, as they are one of the main infrastructure elements, in addition to achieving a developed urban landscape. However, complex residential projects in developing countries face various factors that could be improved in their implementation, especially in Iraq. Sixty-two experts in residential complex projects were interviewed and surveyed to verify these projects' failure factors,. Fifty-one factors were the main failure factors, divided into four main components (leadership, management system, external forces, and project resources). The Relatively Important Index (RII) is used to determine the relative importance factors and obtain the top tw

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of The College Of Basic Education
Spectrophotometric determination of ciprofloxacin by Ion pair complex formation with bromothymol blue‏
...Show More Authors

Publication Date
Sat Feb 12 2022
Journal Name
Engineering, Technology & Applied Science Research
Evaluating the Efficiency of Finance Methods in Residential Complex Projects in Iraq
...Show More Authors

Financial funding of a construction firm plays an important role in all aspects of the process development. It has been noted that financial crises have a direct impact on the construction industry. The Iraqi government, whether locally or globally, has faced a severe shortage of financing which has resulted in incomplete projects. Due to the financial crisis that Iraq went through which led to the suspension of many residential complex projects and the difficulty of the use of public financing methods, we researched the private financing (public-private partnership) methods instead of public financing methods in residential complex projects implementation. This study verified the financial problems and the factors that relate to th

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Intelligent Systems
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
...Show More Authors
Abstract<p>Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co</p> ... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Contemporary Challenges for Cloud Computing Data Governance in Information Centers: An analytical study
...Show More Authors

Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref