Preferred Language
Articles
/
Txf1Q48BVTCNdQwC2mjf
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Computer Science
Dropping down the Maximum Item Set: Improving the Stylometric Authorship Attribution Algorithm in the Text Mining for Authorship Investigation
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue May 28 2019
Journal Name
Al-khwarizmi Engineering Journal
Heuristic D* Algorithm Based on Particle Swarm Optimization for Path Planning of Two-Link Robot Arm in Dynamic Environment
...Show More Authors

 Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved.  In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Educational And Psychological Researches
The impact of discrete realization strategy in the development of reflective thinking among students of Qur'an and Islamic education departments for the course of Islamic jurisprudence
...Show More Authors

The paper aims to identify the impact of discrete realization strategy in the development of reflective thinking among students: (males/females) of Qur'an and Islamic education departments for the course of Islamic jurisprudence according to the variability of sex. The researcher used the experimental approach and adopted an experimental determination with a set part of the two groups (experimental and controlled). He selected the sample deliberately which consists of (147) students spread over four classes (experimental males/ experimental females/ controlled males/ controlled females), and it took last for an academic year of (2010-2011). He, then, prepared a post test to measure the reflective thinking with his five skills (skill of o

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The importance of the application of the Value Added Tax system within the tax reform strategy in Iraq: model proposal
...Show More Authors

One of the globalization results is (VAT) , so it is important to consider its        results and impact on the tax system.    

     The Iraqi economy having wittnisd an acute transition period , still in need for a better care in aim to back it, especialy from the tax system.

The research is concerned with the (VAT) and its details –And for five chapters all the problomes connect are displayed .But yet the new system does not comply with the modern development and this is one of the defects of (VAT) in Iraq.

The history of (VAT)was also studied mentiorned and studied.

     As a conclusion (VAT) is one of the m

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The effect of the reciprocal reading strategy in developing innovative reading skills for fifth-year secondary school students / scientific branch
...Show More Authors

       This research aims to identify the impact of the reciprocal reading strategy on developing the innovative reading skills of fifth-grade secondary school students/ scientific branch. To achieve the goal of the research, an achievement test to measure the academic achievement of fifth-grade secondary school students in  Arabic language grammar was prepared,  a sample of (60) female students from the secondary school of Al- Bawaba Al-Sharkey for Girls in Baghdad were chosen for the academic year (2019-2020). For the purpose of applying the experiment, the test was applied on a pilot sample consisting of (30) students from the same research community. The researcher herself had taught the three

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Idea Filtering Strategy on the Achievement of the Second Year Middle School Female Students in Science
...Show More Authors

Abstract

The current research aims to identify the effect of the idea filtering strategy on the achievement of second-intermediate school female students in science. The two researchers adopted the experimental method and the experimental design with partial control in the two groups (experimental group and control group). The two researchers applied the research experience to a sample of students of the second intermediate grade in the school Martyrs of (Jiser  Al Aimma for Girls) affiliated with the Baghdad Education Directorate / Rusafa /1 for the academic year (2021/2022), which was chosen intentionally. The number of female students in the research sample was (70) students, with (35) students for the ex

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
مجلة جامعة الانبار للعلوم الاقتصادیة والاداریة
Role of the training strategy in achieving the performance of pilot / exploratory study in the General Company for Electrical Industries - Engine Lab - Baghdad
...Show More Authors

The research aims to determine the role of training strategy dimensions of (trainers، curriculum training programs، trainees and their desire for training، administrative and supervisory services and their impact on the success of the training program) in the entrepreneurial performance of the organization dimensions of (pre-planning، renovation and modernization، efficiency، effectiveness)، so search ranks of great importance because it addresses an important and modern issue in performance entrepreneurial، and strategy training، aware of the importance of the subject and expected outcomes (General company for electrical Industries - motor plant) surveyed، was an analysis of data obtained through field visits in addition to the q

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More