Preferred Language
Articles
/
oRcKNo8BVTCNdQwCxWI0
Association rules mining using cuckoo search algorithm
...Show More Authors

Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Algorithm to Solve Linear Volterra Fractional Integro-Differential Equation via Elzaki Transform
...Show More Authors

In this work, Elzaki transform (ET) introduced by Tarig Elzaki is applied to solve linear Volterra fractional integro-differential equations (LVFIDE). The fractional derivative is considered in the Riemman-Liouville sense. The procedure is based on the application of (ET) to (LVFIDE) and using properties of (ET) and its inverse. Finally, some examples are solved to show that this is computationally efficient and accurate.

View Publication Preview PDF
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Ieee Transactions On Intelligent Transportation Systems
Real-Time Intersection-Based Segment Aware Routing Algorithm for Urban Vehicular Networks
...Show More Authors

High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination

... Show More
View Publication
Scopus (66)
Crossref (58)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Efficient Algorithm for Fuzzy Linear Fractional Programming Problems via Ranking Function
...Show More Authors

In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Counting Functions to Generate The Primes in the RSA Algorithm and Diffie-Hellman Key Exchange
...Show More Authors

        The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods  depended on selecting the primes p and q in order  to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article   gives  new construction  of the  RSA  algorithm and DH key  exchange using the

primes p,qfrom areal number x.

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
A Genetic Algorithm for Minimum Set Covering Problem in Reliable and Efficient Wireless Sensor Networks
...Show More Authors

Densely deployment of sensors is generally employed in wireless sensor networks (WSNs) to ensure energy-efficient covering of a target area. Many sensors scheduling techniques have been recently proposed for designing such energy-efficient WSNs. Sensors scheduling has been modeled, in the literature, as a generalization of minimum set covering problem (MSCP) problem. MSCP is a well-known NP-hard optimization problem used to model a large range of problems arising from scheduling, manufacturing, service planning, information retrieval, etc. In this paper, the MSCP is modeled to design an energy-efficient wireless sensor networks (WSNs) that can reliably cover a target area. Unlike other attempts in the literature, which consider only a si

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Association of SCARB1 Gene Expression with Chronic Myeloid Leukemia Progression in a Sample of Iraqi Patients
...Show More Authors

     The present research design examines the relationship between SCARB1 gene expression and the progression of chronic myeloid leukemia (CML) in Iraqi patients. The variations in gene expression between patients with CML and healthy controls were investigated. The gender and age correlations with CML patients were included, as was the association of gene expression folding of the SCARB1 gene with clinical data (WBC, RBC, hemoglobin, platelets, and BCR-ABL gene). The results displayed a significant difference in the mean gene expression level (∆Ct) of the CML group when compared to the matching ∆Ct values in the healthy control group. The gene expression folding of the SCARB1 gene indicates considerable changes in expression, wh

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Parasitology
Association between genetic polymorphism of IL-27 (rs153109) and toxoplasmosis in Iraqi women with recurrent abortion
...Show More Authors

Scopus
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
Technological development and its association with the formal change to devices Flatiron: يوجل عبد الحسين فارس
...Show More Authors

Evolution in the modern era Which led to the rapid change in the forms of industrial products For many reasons, So put current research into question the view (What are the design requirements that define the formal change in the Iron clothes)? To reach the aim of In the design cornerstonesUnderlying the formal changethe Iron of the clothes, In the first section shed light on the development stages of systems design lists the historic stages of development and energy operator devices irons and mechanism of action and internal components, while in the second part, which was entitled (The role of technology and the factors influencing the change formality of Iron) touched on the three topics which technology modern industrial and receiver,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Meta Gene
Association between the rs2234671 polymorphism and the risk of recurrent urinary tract infections in Iraqi women
...Show More Authors

A case-control study was designed to find out the association between rs2234671 polymorphism of cxcr1 and rUTI in a sample of Iraqi women by polymerase chain reaction- sequence-specific primer (PCR-SSP) method. The current findings revealed that the genotype GC (OR= 7.86, 95% CI = 2.82-21.87, P= 7.7 × 10-5) and the C allele (OR= 3.93, 95% CI = 1.97 - 7.83, P = 9.8×10-5) are significantly associated with rUTI. However, the genotype GG played as a protective factor (OR= 0.12, 95% CI = 10.05 - 0.34, P = 4.0 ×10-5). Depending on these findings, the genotype GC is significantly associated with rUTI.

View Publication
Scopus (1)
Scopus Crossref