Preferred Language
Articles
/
jih-2483
Multi-Agent Systems: A Review Study
...Show More Authors

Multi-agent systems are subfield of Artificial Intelligence that has experienced rapid growth because of its flexibility and intelligence in order to solve distributed problems. Multi-agent systems (MAS) have got interest from various researchers in different disciplines for solving sophisticated problems by dividing them into smaller tasks. These tasks can be assigned to agents as autonomous entities with their private database, which act on their environment, perceive, process, retain and recall by using multiple inputs. MAS can be defined as a network of individual agents that share knowledge and communicate with each other in order to solve a problem that is beyond the scope of a single agent. It is imperative to understand the characteristics of the individual agent or computing entity to distinguish a simple distributed system and multi-agent system. To solve each task, the agent can take the appropriate actions, decisions, and can cooperate with other agents to fulfill its goals or objectives. MAS has several applications including cloud computing, web advertisement, e-commerce, computer network, learning abilities, etc. This survey represents a comprehensive discussion of all aspects of MAS, and discusses an overview of MAS definitions, architecture, features, communications, organizations, and finally discusses the some of the real practical applications.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Efficiently-managed Cloudly-Secured Mobile User Data Sharing Code Implementation
...Show More Authors

Increasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authen

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Mar 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of Big Data applications in forecasting corporate bankruptcy: Field analysis in the Saudi Business Environment
...Show More Authors

This study aimed to investigate the role of Big Data in forecasting corporate bankruptcy and that is through a field analysis in the Saudi business environment, to test that relationship. The study found: that Big Data is a recently used variable in the business context and has multiple accounting effects and benefits. Among the benefits is forecasting and disclosing corporate financial failures and bankruptcies, which is based on three main elements for reporting and disclosing that, these elements are the firms’ internal control system, the external auditing, and financial analysts' forecasts. The study recommends: Since the greatest risk of Big Data is the slow adaptation of accountants and auditors to these technologies, wh

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Modern trends in the architecture of mosques in Jordan
...Show More Authors

This study analyzes the features of historical and modern mosques in Jordan compared to that of Amman. The architecture of the Jordanian mosques reflects the images of great ancient empires and kingdoms of Europe and the Middle East. This has happened due to the geographical position of the country. From the studies of historians and archaeologists, comparative analysis of planning solutions, the use of plastics and decor of the facades of mosques, and the literature on the construction methods of the mosques allow us to conclude that age-old traditions have been preserved through the establishment of mosques in both the countries. Besides, the emergence of new features in constructing mosques has been observed. We find the influence of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Applied the Indicators of Green Building in Educational Hospitals in Iraq
...Show More Authors

View Publication
Publication Date
Sun May 26 2019
Journal Name
Iraqi Journal Of Science
Microfacies Architecture and Stratigraphic Development of the Yamama Formation, Southern Iraq
...Show More Authors

The Yamama Formation belongs to the late Berriasian-Aptian succession, which was deposited during the Lower Cretaceous period within the main shallow marine depositional environment.

Petrographic study and microfacies analysis enabled the recognition of six main microfacies for three association facies. These are the Semi-restricted, Shallow open marine and Shoal environments. The study succession represents deposition of three third order cycles, these cycles where deposited during successive episodes of relative sea level rises and still stand.

The presence of shoal association facies (oolitic packstone microfaces) between the Sulaiy and Yamama formations refer to continue the deposition during the same stage, and may s

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
The Role of Patnership Approuch in Facilitating Housing in Iraq
...Show More Authors

  

View Publication Preview PDF
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
Proposed Method of Air Traffic Routing in Dynamic Environment Usiing Modifed rrt With Collision Avoid Nace
...Show More Authors

     In the current Airlines Air Traffic Management (ATM), the Air Traffic Control Operators (ATCO), with the Air Traffic Control systems (ATC), operate air traffic paths with a small number of fixed routes. Problems of fixed routes appear such that even when they reduce the chance for conflict, they also produce flight paths plans that do not reduce flight time or fuel usage. In nowadays Airlines are heavily overloaded and anxious to minimize the aircrafts fuel usage costs, increase airplanes, and optimize the paths or the flight routes in order to find the most optimal suitable flight paths. This paper presents a new path planning method that deal with such problem effectively, the idea was to produce flights routes

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 19 2022
Journal Name
Chemical Methodologies
Biosynthesis, Characterization, and Applications of Bismuth Oxide Nanoparticles Using Aqueous Extract of Beta Vulgaris
...Show More Authors

Bismuth oxide nanoparticle Bi2O3NPs has a wide range of applications and less adverse effects than conventional radio sensitizers. In this work, Bi2O3NPs (D1, D2) were successfully synthesized by using the biosynthesis method with varying bismuth salts, bismuth sulfate Bi2(SO4)3 (D1) or bismuth nitrate. Penta hydrate Bi(NO3)3.5H2O (D2) with NaOH with beta-vulgaris extract. The Bi2O3NPs properties were characterized by different spectroscopic methods to determine Bi2O3NPs structure, nature of bonds, size of nanoparticle, element phase, presence, crystallinity and morphology. The existence of the Bi2O3 band was verified by the FT-IR. The Bi2O3 NPs revealed an absorption peak in the UV-visible spectrum, with energy gap Eg = 3.80eV. The X-ray p

... Show More
Publication Date
Thu Oct 01 2015
Journal Name
Al–bahith Al–a'alami
Communicative Applications in the Websites of the Iraqi Political Parties and their Role in Providing Opportunities for Political Participation
...Show More Authors

The present study deals with the websites of Iraqi political parties on the internet to identify the effectiveness in providing communicative applications that help audience to participate, express their opinions, their positions, and other aspects reflecting the extent of employing modern technological tools to allow opportunities for political, and democratic participation since the internet has become an effective tool for political communications of political parties. The research sample includes eight political parties. The research concludes that the Iraqi political parties do not employ interactive communication patterns to reflect their interests in communicating with the public, providing opportunities for their participation an

... Show More
View Publication Preview PDF
Crossref (1)
Crossref