Preferred Language
Articles
/
_BdkL48BVTCNdQwCk13t
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

Crossref
View Publication
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Catalysts for money laundering and control by the banks / analytical study in the province of Arbil measures
...Show More Authors

Receive money laundering phenomenon of interest to researchers and scholars on different intellectual orientation of economic or political or other, as this process is gaining paramount importance in light of business and increase the number of banks in the province of Kurdistan of Iraq and Erbil in particular and in the presence of openness developments chaotic economic and there are no factors encourage money laundering operation because of the presence of the hidden economy and the weakness of the banking and legal measures to combat them, and on this basis there is a need to examine money laundering operation in the province of Arbil, to indicate the presence or absence of a money laundering operation in working in the provin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 02 2023
Journal Name
African Journal Of Advanced Pure And Applied Sciences (ajapas)
African Journal of Advanced Pure and Applied Sciences (AJAPAS)
...Show More Authors

African Journal of Advanced Pure and Applied Sciences (AJAPAS)

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Statistical Sciences
Use the robust RFCH method with a polychoric correlation matrix in structural equation modeling When you are ordinal data
...Show More Authors

View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Wiadomości Lekarskie
EVALUATION OF TWO CRYOPROTECTANTS USED IN A NEW HUMAN SPERM CRYOPRESERVATION TECHNIQUE
...Show More Authors

The aim: To examine the efficiency of different concentrations of Dimethyl sulfoxide (DMSO) and glycerol as a cytoprotectants in protection of human sperms during cryopres¬ervation in this technique. Materials and methods: Thirty oligozoospermic semen samples were used in this study. Samples diagnosed according to WHO 2010 criteria. Sheep’s ovarian follicles obtained from local slaughterhouse and prepared by slicing the ovaries and evacuating the follicular fluid and oocyte. Each semen sample divided into six equal parts, and diluted 1:1 with cryosolution contains 5%, 10%, 15% DMSO or glycerol and injected within the emptied follicles. After freezing and thawing, the semen mixture aspired outside the follicles and sperm concentr

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Design trends of family dual-used in small spaces: محمد سعد الجميلي
...Show More Authors

Comes interest in the subject matter in the selection of the Family industry globally as one of the important industries which have developed a clear and significant in recent years, to look at these products and designs to their functional importance have appeared in recent years, the phenomenon of the small spaces because of housing Population density showed the need to find a spare Furniture fit these small spaces On this basis, determine the objective of this research is to arrive at a design techniques for dual-family employee for small spaces research sample included a double family manufactured in laboratories industry Furniture in Baghdad and local research sample includes family double Decker.Research focused on the first four c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
International Journal Of Agricultural & Statistical Sciences
RESPONSE OF OLIVE SEEDLINGS TO HUMIC ACID AND INOCULATION BY FUNGI (TRICHODERMA SSP) AND THE INTERACTION OF THEM AND IRRIGATION BY SALT WATER ON VEGETATIVE GROWTH.
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Data Mining, Modelling And Management
Association rules mining using cuckoo search algorithm
...Show More Authors

Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.

View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Fri Jan 01 2010
Journal Name
Iraqi Journal Of Science
RETRIEVING DOCUMENT WITH COMPACT GENETIC ALGORITHM(CGA)
...Show More Authors

Preview PDF