Preferred Language
Articles
/
bsj-2557
Development Binary Search Algorithm
...Show More Authors

There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case complexity of Search) is O(log2 n) (pronounce this "big-Oh-n" or "the order of magnitude"), if we search in a list consists of (N) elements. In this research the number of comparison is reduced to triple by using Triple structure, this process makes the maximum number of comparisons is O(log2 (n)/3+1) if we search key in list consist of (N) elements.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 16 2025
Journal Name
Sn Computer Science
Defending Digital Integrity: Advances in Media Forgery Analysis Research and Cybersecurity Development
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 02 2024
Journal Name
Stallion Journal For Multidisciplinary Associated Research Studies
Measuring The Impact of Water Scarcity on Agricultural Economic Development in Iraq
...Show More Authors

Water provision is sensitive to climate change, and agricultural production and food supply are sensitive to water availability. Water scarcity affects food security and agricultural economic development through changes in agricultural production and changes in the composition of produced goods. Recent droughts also led to a decrease in the volume of water allocated to agriculture, which led to a decrease in total agricultural production and exports, and this has subsequent impacts on food security and economic development. The research aimed to measure the impact of water scarcity on agricultural economic development for the period 1990-2022. The research included three behavioral equations with three endogenous variables: the cult

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Oct 26 2023
Journal Name
Farmacia
THE DEVELOPMENT OF A BRAIN TARGETED MUCOADHESIVE AMISULPRIDE LOADED NANOSTRUCTURED LIPID CARRIER
...Show More Authors

View Publication
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Apr 03 2024
Journal Name
International Journal Of Economics And Finance Studies
THE IMPACT OF ARTIFICIAL INTELLIGENCE ON ACCOUNTING PERFORMANCE: SUSTAINABLE DEVELOPMENT AS A MEDIATING VARIABLE
...Show More Authors

The UN plans to achieve several development objectives by 2030. These objectives address global warming, a major issue. This method aims to improve sustainable accounting performance (AP). In this circumstance, AI is being applied in various fields, notably in economic, social, and environmental (ESE) domains. This research investigates how sustainable development (SD) influences AI methodologies and AP improvement. The research examined a sample of Iraqi banks listed on the Iraq Stock Exchange from 2014 to 2022. AI was measured by ATM and POS prevalence. A three-dimensional approach examined economic, social, and environmental (ESE) sustainability. Meanwhile, the performance of sustainable accounting was measured through the return on asse

... Show More
Preview PDF
Scopus (2)
Scopus
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact Cloud Computing On The Development of Accounting Education: Evidence From Sultanate of Oman
...Show More Authors

Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of ​​cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 04 2010
Journal Name
Journal Of Educational And Psychological Researches
Effective an instructional in program in the development of some of the moral values on the children of kindergarten
...Show More Authors

The research aims to
1 – The discloser  of the level of moral values in the children of
kindergarten.
2 - Building an educational program designed to develop moral values on the children of
kindergarten.

3 - Knowing the impact of the program in the development of moral values in children
Purposive sample was selected consisted of 40 children and a child aged 5-6 years and to achieve objectives of the research promising measure of the moral  values
kindergarten has been applied to the children of the two groups was based on  pre and post test

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 27 2018
Journal Name
Al–bahith Al–a'alami
The Role of Local Satellite Channels toward the Social and Cultural Development in U.A.E Society
...Show More Authors

The study seeks to analyze the perceptions of audience in UAE towards the performance of Emirates Satellite TV Channels. It analyzed the exposure motivations of audience to satellite TV channels, its positive and negative aspects and to what extent they abide by media ethics. A survey is conducted with a sample of four hundred. The study shows significant differences between male and female towards the characteristics of TV channels, its positive and negative aspects and its commitments to media ethics.

            The study also shows that the expectancy value model and third person effect model are applicable in studying the perceptions of audience and media people in UAE t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
The efficiency of cluster analysis to analyzing medical image of Covid-19 patient by using K-means algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
A Cognition Path Planning with a Nonlinear Controller Design for Wheeled Mobile Robot Based on an Intelligent Algorithm
...Show More Authors

This paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF