Preferred Language
Articles
/
joe-2056
A Proposal Algorithm to Solve Delay Constraint Least Cost Optimization Problem
...Show More Authors

Traditionally, path selection within routing is formulated as a shortest path optimization problem. The objective function for optimization could be any one variety of parameters such as number of hops, delay, cost...etc. The problem of least cost delay constraint routing is studied in this paper since delay constraint is very common requirement of many multimedia applications and cost minimization captures the need to
distribute the network. So an iterative algorithm is proposed in this paper to solve this problem. It is appeared from the results of applying this algorithm that it gave the optimal path (optimal solution) from among multiple feasible paths (feasible solutions).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Partial Least Squares and Principal Components Methods by Simulation
...Show More Authors

Abstract                                                                                              

The methods of the Principal Components and Partial Least Squares can be regard very important methods  in the regression analysis, whe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Manual proposal to audit the automated accounting system in accordance with the framework (COBIT): Applied Research in the General Company for Petrochemical Industries
...Show More Authors

The information revolution، the new language has become one for all the peoples of the world through handling and exchange and to participate in all key areas (economic، cultural and scientific) and Accounting episode of this revolution has turned most of the traditional systems (manual) in companies to automated systems، this transformation in the regulations summoned from the auditors that develops their traditional examination automated systems so had to provide tools for auditing help auditors to keep abreast of developments and as a result there is no evidence checksum Local Private audited automated systems came search to provide evidence helps auditors for guidance as part of COBIT، which provides audit procedures Detailed inf

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposition Framework to Application Kaizen Cost Technique of to realization Target Pricing: Practical Study in the Al-Muthanna Cement Company
...Show More Authors

The study the problem emerged in the inability of local companies to enter the field of active competition with other companies operating in the same economic sector due to the high cost of their products, hence, the companies that want to apply this technique can effectively compete in order to achieve those objectives.

  So this study focused on the goal of reducing the cost of products by reducing the cost product to a minimum , as the study was based in its hypothesis on the ability of companies to application this technique which in turn leads to increased profits under conditions of normal working and the power available and their potential in improving the quality of its products, as well as the need for full coordina

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Heuristic Program proposal for the treatment of talented emotional and Cognitive problems
...Show More Authors

Heuristic Program proposal for the treatment of talented emotional and Cognitive problems .

1-The Curtent research aims : to identify the needs of gifted students and their problems and Ways to diagnose .

2-reprepare aproposal heuristic program for the treatment of emotional and Cognitive talented problems .

Research . Methodology : analytical and descriptive .

Define the terms

Virt uoso is the per for mance of the privileged Mstmrave performances appear in any area of his Values .

Chapter ll : Includes recipes gifted child and Methods diagnosis gifted by filtrontion and standavds of personal and mental and behavioral Doramwaliman and parental Features and Leader in the detection of the gif

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role & Mechanism of Market Makers in Iraqi Stock Market: "Proposal Frame"
...Show More Authors

This researchable paper aims to focus of the role & mechanism of market makers in Iraqi stock market through analyzing its role in other Arabian as well as global stock ones, especially in current period through activate the use of bonds, shares, and trying to create a continued price balance. Then decreasing the opportunity having gaps between highest and lowest level without reasonable causes. In addition trying to deactivate the common decision without supported information. Moreover, this paper aims to explain the rules of increasing liquidity and having balance to lead the market into positive direction.  Thus, for achieving the above-mentioned requirements, such conditions should be underlined by market makers as well as t

... Show More
View Publication
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Attitude The King Ghazi a Problem the Border with Kuwait 1933-1939
...Show More Authors

King Ghazi (1933-1939) was of the Arabic characters that characterized national and
patriotic spirit and that faced the British policy in all its aspects.
King Ghazi distinguished as of Arab nationalist tendencies and called for the
liberalization of Arab lands which were under the rule of the Ottoman Empire. He called for
reunification under the one Arab country, Hence came the King invitations to liberate Kuwait
from the British protectorate and consolidated with Iraq.
King Ghazi established a private radio station in the royal palace (AL zzaahoor) palace
and provided special programs to return of Kuwait to Iraq, this radio station was The
prominent role in the revitalization of the Kuwaiti National Movement, an

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 25 2025
Journal Name
International Journal Of Data And Network Science
Multi-objective of wind-driven optimization as feature selection and clustering to enhance text clustering
...Show More Authors

Text Clustering consists of grouping objects of similar categories. The initial centroids influence operation of the system with the potential to become trapped in local optima. The second issue pertains to the impact of a huge number of features on the determination of optimal initial centroids. The problem of dimensionality may be reduced by feature selection. Therefore, Wind Driven Optimization (WDO) was employed as Feature Selection to reduce the unimportant words from the text. In addition, the current study has integrated a novel clustering optimization technique called the WDO (Wasp Swarm Optimization) to effectively determine the most suitable initial centroids. The result showed the new meta-heuristic which is WDO was employed as t

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (4)
Crossref