Preferred Language
Articles
/
Chi3LpUBVTCNdQwCHypz
Design and Development of Powerful Neuroevolution Based Optimized GNNBiLSTM Model for Consumer Behaviour and Effective Recommendation in Social Networks
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Scopus (54)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Ensemble Approach for Detecting COVID-19 Propaganda on Online Social Networks
...Show More Authors

     COVID-19 affected the entire world due to the unavailability of the vaccine. The social distancing was a contributing factor that gave rise to the usage of Online Social Networks. It has been seen that people share the information that comes to them without verifying its source . One of the common forms of information that is disseminated that have a radical purpose is propaganda. Propaganda is organized and conscious method of molding conclusions and impacting an individual's contemplations to accomplish the ideal aim of proselytizer. For this paper, different propagandistic tweets were shared in the COVID-19 Era. Data regarding COVID-19 propaganda was extracted from Twitter. Labelling of data was performed manually using diffe

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Educational Planning, it's Importance in the Social, Economical and Educational Development
...Show More Authors

Educational Planning, it's Importance in the Social, Economical and Educational Development

View Publication Preview PDF
Publication Date
Tue Dec 10 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
...Show More Authors

Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Fme Transactions
Development of automated liquid filling system based on the interactive design approach
...Show More Authors

The automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve

... Show More
View Publication
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Development and Implementation a Programmable Model for Evaluation Pumping Technique
...Show More Authors

This work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Design and Development of Smart List: A Mobile App for Creating and Managing Grocery Lists
...Show More Authors

Research in consumer science has proven that grocery shopping is a complex and distressing process. Further, the task of generating the grocery lists for the grocery shopping is always undervalued as the effort and time took to create and manage the grocery lists are unseen and unrecognized. Even though grocery lists represent consumers’ purchase intention, research pertaining the grocery lists does not get much attention from researchers; therefore, limited studies about the topic are found in the literature. Hence, this study aims at bridging the gap by designing and developing a mobile app (application) for creating and managing grocery lists using modern smartphones. Smartphones are pervasive and become a necessity for everyone tod

... Show More
View Publication Preview PDF
Crossref (4)
Clarivate Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref