Preferred Language
Articles
/
ijs-6487
Collision Avoidance Using Cat Swarm Algorithm for Multi Mobile Robot Path Planning in Dynamic Environment
...Show More Authors

In this paper, we proposed a hybrid control methodology using improved artificial potential field with modify cat swarm algorithm to path planning of decoupled multi-mobile robot in dynamic environment. The proposed method consists of two phase: in the first phase, Artificial Potential Field method (APF) is used to generate path for each one of robots and avoided static obstacles in environment, and improved this method to solve the local minimum problem by using A* algorithm with B-Spline curve while in the second phase, modify Cat Swarm Algorithm (CSA) is used to control collision that occurs among robots or between robot with movable obstacles by using two behaviour modes: seek mode and track mode. Experimental results show that the proposed method success to find a complete, optimal, and collision free path for all robot.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm
...Show More Authors

      The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Developing the Complexity and Security of the Twofish Algorithm Through a New Key Scheduling Design
...Show More Authors

     The Twofish cipher is a very powerful algorithm with a fairly complex structure that permeates most data parsing and switching and can be easily implemented. The keys of the Twofish algorithm are of variable length (128, 192, or 256 bits), and the key schedule is generated once and repeated in encrypting all message blocks, whatever their number, and this reduces the confidentiality of encryption. This article discusses the process of generating cipher keys for each block. This concept is new and unknown in all common block cipher algorithms. It is based on the permanent generation of sub keys for all blocks and the key generation process, each according to its work. The Geffe's Generator is used to generate subkeys to make eac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Optimal CPU Jobs Scheduling Method Based on Simulated Annealing Algorithm
...Show More Authors

     Task scheduling in an important element in a distributed system. It is vital how the jobs are correctly assigned for each computer’s processor to improve performance. The presented approaches attempt to reduce the expense of optimizing the use of the CPU. These techniques mostly lack planning and in need to be comprehensive. To address this fault, a hybrid optimization scheduling technique is proposed for the hybridization of both First-Come First-Served (FCFS), and Shortest Job First (SJF). In addition, we propose to apply Simulated Annealing (SA) algorithm as an optimization technique to find optimal job’s execution sequence considering both job’s entrance time and job’s execution time to balance them to reduce the job

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
study the effects of the polluted waste water on the environment
...Show More Authors

to study the discribrion and the pollution in the environment in the south of baghdad samples of waste water from industrail units using the mercury in its process also

View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Person-Organization's Environment Fit and it's Reflection on the Work Outcomes
...Show More Authors

This study aims to studying of Person and organization’s environment fit in a sample of Private bank’s reflection in its basic dimensions (Person-organization fit ,Person-Job fit, Person-group fit and Person- Person-fit )in the Work Outcomes (job satisfaction, the intention to leave the job, Job Engagement, and organizational  citizenship behavior ).

The questionnair’e has been used as a basic  instrument to gather data , As well as personal interviews with some of the staff of the research sample of private banks which were represented by (5) and included banks (Bank of Assyria for investment, the North Bank for Finance and Investment , Bank of the Tigris

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Physical Environment and Crowded Classes on Academic Achievement
...Show More Authors

The research problem can be summarized through focusing on the environment that surrounds students and class congestion, how these factors affect directly or indirectly the academic achievement of students, how these factors affect understanding the scientific material that the student receives in this physical environment, how classroom’s components such as seats, space With which the student can move, the number of students in the same class,  the lighting, whether natural or artificial, and is this lighting sufficient or not enough, the nature of the wall paint old or modern, is it comfortable for sight, the blackboard if it is Good or exhausted,  In addition to air-conditioning sets in summer and winter, this is on the on

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
The Use Of Genetic Algorithm In Estimating The Parameter Of Finite Mixture Of Linear Regression
...Show More Authors

The estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To

... Show More
View Publication
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
One Algorithm to Cipher Messages in Columnar and Fixed Period-d Transposition Cipher
...Show More Authors

    One of ciphering systems depends on transposition of letters in plain text to generate cipher text. The programming of transposition depends mainly on 2-dimension matrix in either methods but the difference is in columnar .We print columns in the matrix according to their numbers in key but in the fixed, the cipher text will be obtained by printing matrix by rows.

View Publication Preview PDF
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Acquired Error in using Antibiotic for Surgery Patients in Iraqi Hospitals
...Show More Authors

The use of antibiotics (AB) in surgery focused in either treating established infection or to prevent suspected post-operative infection. Inappropriate use of antibiotic for treatment of patients with common infections is a major problem worldwide, with great implications with regards to cost of treatment and development of resistance to the antimicrobial agent. Moreover, antibiotics may often be dispensed without a clear clinical indication. This study was conducted to estimate the medication errors in using antibiotic for surgery patients which may effect their wound healing. A 260 patients with clean-contaminated and contaminated surgery were included from two teaching hospitals, 160 patient from Medical city hospital and 100 fro

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref