Expansion the engineering consultancy offices in the universities of Iraq, about (14) offices, leading to increas the competition between them, especially after the great trends of Iraqi government agencies to use the academic experiences and their efficiencies in general, due to non-existence of the engineering qualification in the government institutions to do the engineering designs ,supervision of projects and other engineering works which are practicing by the engineering consultancy offices in order to get the best performance of the work.Within this serious competition, needing a specific approach to enable government agencies to choose the optimal and alternative consultancy office to meet specific project and not rely on cronyis
... Show MoreBackground The study covered thirty-three species which grown wildly in Iraq and a comparative study for all kinds of morphological characters were done. Principal Findings The most stable and important taxonomic characters were pointed out, diagrams, illustrations, scheduals, micrographs were also documented. Stamens, nutlets, basal leaves, bracts, bracteoles, calyces, corollas and their trichomes were very important taxanomic characters. The trichomes were variable in variable species therefore used as a diagnostic characters for the species. Conclusions New species Salvia margasurica Al-Musawi & Al-Hussaini was suggested to be new record for science. Keywords: Salvia, Morphology, Spec. Nov.
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More
Abstract
The human mind knew the philosophy and logic in the ancient times, and the history afterwards, while the semiotics concept appeared in the modern time, and became a new knowledge field like the other knowledge fields. It deals, in its different concepts and references, with the processes that lead to and reveals the meaning through what is hidden in addition to what is disclosed. It is the result of human activity in its pragmatic and cognitive dimensions together. The semiotic token concept became a knowledge key to access all the study, research, and investigation fields, due to its ability of description, explanation, and dismantling. The paper is divided into two sections preceded by a the
... Show MoreThis paper proposes two hybrid feature subset selection approaches based on the combination (union or intersection) of both supervised and unsupervised filter approaches before using a wrapper, aiming to obtain low-dimensional features with high accuracy and interpretability and low time consumption. Experiments with the proposed hybrid approaches have been conducted on seven high-dimensional feature datasets. The classifiers adopted are support vector machine (SVM), linear discriminant analysis (LDA), and K-nearest neighbour (KNN). Experimental results have demonstrated the advantages and usefulness of the proposed methods in feature subset selection in high-dimensional space in terms of the number of selected features and time spe
... Show More