Preferred Language
Articles
/
jRcLOI8BVTCNdQwCSmPQ
A new multi-objective evolutionary framework for community mining in dynamic social networks

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Community Structure of Benthic Algae in a Lotic Ecosystem, Karbala Province-Iraq

This study focused on benthic algae (epipelic and attached algae on concrete lining stream) in Bani-Hassan stream in Holly Karbala, Iraq. The qualitative and quantitative studies of benthic algae were done by collecting 240 samples from five sites in the study area for the period from December 2012 to November 2013. Also, the environmental variables of the stream were examined in term of temporary and spatial. The results showed that the stream was alkaline, hard, oligohaline and a well aerated. The total nitrogen to the total phosphorus (TN: TP) ratio indicates nitrogen limitation. 129 species of benthic algae belonging to 57 genera were identified. Bacillariophyceae (diatoms) was the predominant taxon (95 species) followed by Chlorophyce

... Show More
Scopus (11)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Oct 02 2015
Journal Name
American Journal Of Applied Sciences
Advances in Document Clustering with Evolutionary-Based Algorithms

Document clustering is the process of organizing a particular electronic corpus of documents into subgroups of similar text features. Formerly, a number of conventional algorithms had been applied to perform document clustering. There are current endeavors to enhance clustering performance by employing evolutionary algorithms. Thus, such endeavors became an emerging topic gaining more attention in recent years. The aim of this paper is to present an up-to-date and self-contained review fully devoted to document clustering via evolutionary algorithms. It firstly provides a comprehensive inspection to the document clustering model revealing its various components with its related concepts. Then it shows and analyzes the principle research wor

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
A Modified Strength Pareto Evolutionary Algorithm 2 based Environmental /Economic Power Dispatch

A Strength Pareto Evolutionary Algorithm 2 (SPEA 2) approach for solving the multi-objective Environmental / Economic Power Dispatch (EEPD) problem is presented in this paper. In the past fuel cost consumption minimization was the aim (a single objective function) of economic power dispatch problem. Since the clean air act amendments have been applied to reduce SO2 and NOX emissions from power plants, the utilities change their strategies in order to reduce pollution and atmospheric emission as well, adding emission minimization as other objective function made economic power dispatch (EPD) a multi-objective problem having conflicting objectives. SPEA2 is the improved version of SPEA with better fitness assignment, density estimation, an

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Computer Science And Information Security (ijcsis)
Finite State Automata Generator for DNA Motif Template as Preparation Step for Motif Mining

There are many tools and S/W systems to generate finite state automata, FSA, due to its importance in modeling and simulation and its wide variety of applications. However, no appropriate tool that can generate finite state automata, FSA, for DNA motif template due to the huge size of the motif template. In addition to the optional paths in the motif structure which are represented by the gap. These reasons lead to the unavailability of the specifications of the automata to be generated. This absence of specifications makes the generating process very difficult. This paper presents a novel algorithm to construct FSAs for DNA motif templates. This research is the first research presents the problem of generating FSAs for DNA motif temp

... Show More
Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment

     In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on

... Show More
Scopus (6)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
Neural Networks as a Discriminant Purposes

Discriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.

In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.  

 

 

Crossref
View Publication Preview PDF
Publication Date
Wed Oct 07 2020
Journal Name
Journal Of Legal Sciences
Evolutionary Interpretation of International Treaties

This article dealt with the evolutionary interpretation in three parts: First, it focused on the conceptual framework of evolutionary interpretation of International Treaties, its philosophical and legal foundation and its determinants. As for the second topic, it dealt with the position of the International Court of Justice from the evolutionary interpretation, studying and analyzing its precedents in this aspect and the resulting proposed and adopted criteria. The third topic dealt with the position of the judiciary of human rights through analyzing the rulings of the European Court of Human Rights and the Inter - American Court of Human Rights based on the criteria that were produced by the judicial practices, which varied according t

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Social Safety Nets and its role in the protection of widows (Problems and advancement options) A field study in the Social Welfare Department for Women

Current search problem manifested and widows who community harsh to bear hardships and pains، The goals of continuing the sustainability of life and take responsibility, and especially in light of the difficult circumstances in which Iraq is going through, and the displacement of murder and terrorism, which generated huge numbers of widows and orphans Because of the loss of a breadwinner and which became women and children are the most harm to the victim and as a result of wars and armed tendencies So this research is an important and vital topic opens our horizons important for overlapping roles of women widows and their impact on the achievement and status of Iraqi women and that as long as aptly characterized and their ability to end

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Quantitative Analysis for Road networks in Karbala Governorate

The road networks is considered to be one of the determinants that controls to specify the areas of human activities, which it depend on to specify the arrival cost , in addition it is useful to achieve the connectivity for interaction and human activities , and shorten the distance and time between the population and places of service. The density of the road network in any space directly affected by the density of population and the type of economic activities and administrative functions performed by the space. On this basis, the subject of this study is reflected in the quantitative analysis of the roads network in the Governorate of Karbala. The study consists the quantitative analysis for the roads network and the Urban Nodes in th

... Show More
View Publication Preview PDF