Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show MoreThe research aims to identify the importance of using analytical procedures in the detection of creative accounting practices. To achieve this goal, (100) questionnaires were prepared and distributed to the auditors in the Federal Financial Supervision Bureau and the authorized auditors' offices and practitioners of the auditing profession in Iraq. For the purpose of testing the research hypothesis and analyzing data, some appropriate statistical methods have been used and the use of the statistical program (SPSS) to analyze the data. The results of the research showed that the analytical procedures and tests applied by the auditor have a role in revealing and limiting creative accounting practices and methods and that auditors u
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreThis research interested to study the structural configuration in the square kufi script, as the kufi script is one of the oldest Arabic fonts, and this name was named according to the city of Kufa, so its types, forms, and designations were numerous, including the square kufic script, which was characterized by being a very straightforward engineering script based on the principle of squaring in building letters to form an engineering body that governs its construction of a set of organizational relationships and design bases according to an engineering structural system. The researchers identified the problem of his research with the following question: What is the Structural configuration in the square Kufic script?
Therefore, the
This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi
... Show MoreThe antiviral activity of leaf extracts from Datura stramonium and tomato plants inoculated with TMV, combined with 20% skimmed milk, was investigated. A TMV isolate was confirmed using bioassay, serological, and molecular approaches and subsequently used to inoculate plants. Tomato plants, both pre- and post-inoculated with TMV, were sprayed with leaf extracts from either TMV-free or infected plants, alone or mixed with 20% skimmed milk. Enzyme-linked immunosorbent assay (ELISA) using tobamovirus-specific antibodies and local lesion tests were conducted to assess antiviral activity based on virus concentration and infectivity in treated plants. The experiment followed a completely randomized design (CRD), and the Least Significant
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show More