Preferred Language
Articles
/
BRc5_Y4BVTCNdQwCoVtp
Enhanced Twitter Community Detection using Node Content and Attributes
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Nouns and attributes And what the Kalamayons termed it
...Show More Authors

Many people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I d

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Sensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte

... Show More
Scopus (66)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

View Publication
Scopus (66)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Swarm And Evolutionary Computation
A review of heuristics and metaheuristics for community detection in complex networks: Current usage, emerging development and future directions
...Show More Authors

Scopus (66)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 17 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Pearson coefficient matrix for studying the correlation of community detection scores in multi-objective evolutionary algorithm
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Classification of Optical Images of Cervical Lymph Node Cells
...Show More Authors
Abstract<p>the study considers the optical classification of cervical nodal lymph cells and is based on research into the development of a Computer Aid Diagnosis (CAD) to detect the malignancy cases of diseases. We consider 2 sets of features one of them is the statistical features; included Mode, Median, Mean, Standard Deviation and Maximum Probability Density and the second set are the features that consist of Euclidian geometrical features like the Object Perimeter, Area and Infill Coefficient. The segmentation method is based on following up the cell and its background regions as ranges in the minimum-maximum of pixel values. The decision making approach is based on applying of Minimum Dista</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (20)
Crossref (18)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref