Preferred Language
Articles
/
nRcANo8BVTCNdQwCOGLO
An efficient artificial fish swarm algorithm with harmony search for scheduling in flexible job-shop problem
...Show More Authors

Flexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best solution. When it is the better one, it replaces with the artificial fish swarm solution from which this solution was improvised. Meanwhile the best improvised solutions are carried over to the Harmony Memory. The objective is to minimize a total completion time (makespan) and to make the proposed approach as a portion of the expert and the intelligent scheduling system for remanufacturing decision support. Harmony search algorithm has demonstrated to be efficient, simple and strong optimization algorithm. The ability of exploration in any optimization algorithm is one of the key points. The obtained optimization results show that the proposed algorithm provides better exploitation ability and enjoys fast convergence to the optimum solution. As well, comparisons with the original artificial fish swarm algorithm demonstrate improved efficiency.

Scopus
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
A comparative reading of the social and political satire in the works of Abu al-Fadl Zrui Nasrabad and Ahmad Rajab (The tadhk: خوانش تطبیقی طنز اجتماعی – سیاسی در آثار ابوالفضل زرویی نصرآباد و احمد رجب(مورد مطالعه: تذکرة المقامات زرویی و نصف كلمة احمد رجب)
...Show More Authors

           Satire is genre of the literary arts that has always been the source of human interest. Because  it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 11 2023
Journal Name
College Of Islamic Sciences
Collision in the dispute between the two imams Shafi’i and Abu Hanifa by Sheikh Mansour bin Muhammad bin Abd al-Jabbar al-Marwazi al-Samani Abi al-Muzaffar (d. 498 AH) from the issue (If one of the Muslim spouses apostatized and one of the infidel spouses
...Show More Authors

The science of jurisprudence is one of the legal sciences that scholars have been interested in since the first centuries of Islam, and they wrote many books about it, and the science of manuscripts is considered one of the scientific achievements in which many scholars emerged, including Imam Al-Samaani, so I chose this manuscript related to Istism to clarify its concept and meaning for all people, The student (Ali Ahmed Abdel-Aziz Sheikh Hamad) preceded me in the investigation of part of the book, and it was facilitated for me, by the grace of God Almighty, to investigate the issue (if one of the Muslim spouses apostatized and one of the infidel spouses converted to Islam until the end of the issue of if the two spouses were taken capt

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The vision of Hebrew writers and critics of the future of the Jews in their writings at the end of the 19th century and the beginning of the twentieth c: דעותיהם של הסופרים והמבקרים העבריים על עתידם של היהודים לפי כתבותיהם בשלהי המאה ה-19 ובתחילת המאה ה-20
...Show More Authors

It is very known  how great is the  role of the Jewish writers in the system of the Zionist movement. The movement relied on writers and writers to carry out their programs, especially those pertaining to the creation of a "national homeland" for Jews. Most Jewish writers sang of  Palestine even though they were not born there.

    On such a  basis, we have followed closely the writings of writers, critics and others by the end of the nineteenth century and the beginning of the twentieth century. We found that these writings are based on one common question: What is the fate of the Jewish people?

    Most of these writings were accompanied by Theodor Herzl's proj

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
Hiding and Encryption of Secret Image Using Secret Sharing Scheme
...Show More Authors

With the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Secure Location Privacy Transmitting Information on Cellular Networks
...Show More Authors

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
New algorithms to Enhanced Fused Images from Auto-Focus Images
...Show More Authors

Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
LDPC CODED MULTIUSER MC-CDMA PERFORMANCE OVERMULTIPATH RAYLEIGH FADING CHANNEL
...Show More Authors

This work presents the simulation of a Low density Parity Check (LDPC) coding scheme with
multiuserMulti-Carrier Code Division Multiple Access (MC-CDMA) system over Additive White
Gaussian Noise (AWGN) channel and multipath fading channels. The decoding technique used in
the simulation was iterative decoding since it gives maximum efficiency with ten iterations.
Modulation schemes that used are Phase Shift Keying (BPSK, QPSK and 16 PSK), along with the
Orthogonal Frequency Division Multiplexing (OFDM). A 12 pilot carrier were used in the estimator
to compensate channel effect. The channel model used is Long Term Evolution (LTE) channel with
Technical Specification TS 25.101v2.10 and 5 MHz bandwidth including the chan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
The Effect of Classification Methods on Facial Emotion Recognition ‎Accuracy
...Show More Authors

The interests toward developing accurate automatic face emotion recognition methodologies are growing vastly, and it is still one of an ever growing research field in the region of computer vision, artificial intelligent and automation. However, there is a challenge to build an automated system which equals human ability to recognize facial emotion because of the lack of an effective facial feature descriptor and the difficulty of choosing proper classification method. In this paper, a geometric based feature vector has been proposed. For the classification purpose, three different types of classification methods are tested: statistical, artificial neural network (NN) and Support Vector Machine (SVM). A modified K-Means clustering algorithm

... Show More
View Publication Preview PDF
Crossref (2)
Crossref