Preferred Language
Articles
/
bBbQm4cBVTCNdQwChFhP
On-Line Navigational Problem of a Mobile Robot Using Genetic Algorithm
...Show More Authors

Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Oct 16 2018
Journal Name
Springer Science And Business Media Llc
MOGSABAT: a metaheuristic hybrid algorithm for solving multi-objective optimisation problems
...Show More Authors

Scopus (61)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Algorithm for nth Order Intgro-Differential Equations by Using Hermite Wavelets Functions
...Show More Authors

In this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Community Detection in Modular Complex Networks Using an Improved Particle Swarm Optimization Algorithm
...Show More Authors

     Community detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem.  In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Political Sciences Journal
The problem of political change in Algeria
...Show More Authors

The article aims to study the crisis of political change  from three Phases . The first focuses on the crises of political legitimacy and democratic postponement, as fundamental issues in analyzing the phenomenon of power struggle through the dialectic between the concept of historical legitimacy and institutional fragility from the beginning of statehood in 1962 to the stage of multi-partyism and the cessation of the electoral process in the 1990s. While the second focuses on the question of the monopoly of power in the post-terrorism and national reconciliation according to considerations  Political, social and security measures to prolong the life of the regime and avoid the demands of political change brought about

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 18 2019
Journal Name
Political Sciences Journal
The succession of power's problem in Lebanon
...Show More Authors

Abstract Political power in Lebanon is a fundamental objective of any political organization, whether political party or political group. Thus, there is a conflict of power. There are two kinds of political conflict that are differentiated by the idea of legitimacy. The competition is in the political system when the agreement between the social forces is considered legitimate, and the conflict is on the political system when the agreement between these forces ceases to be legitimate and Are working to topple it and seek to establish an alternative system. Therefore, the succession of power in Lebanon is a result of the competition and political conflict, which is in turn a result of the large number of regional and international players

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2017
Journal Name
2017 Second International Conference On Fog And Mobile Edge Computing (fmec)
Smart Virtual eNB (SVeNB) for 5G mobile communication
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref