Preferred Language
Articles
/
J0LykJoBMeyNPGM3p86K
Categorization of ‘Holy Quran-Tafseer’ using K-Nearest Neighbor Algorithm
...Show More Authors

Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
2018 9th International Conference On Information And Communication Systems (icics)
An intersection-based segment aware algorithm for geographic routing in VANETs
...Show More Authors

In networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (11)
Scopus Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
The Impact of the Quranic Readings in Removing the Paradox in Imam Al Wahidi in his Al Wasiet Interpretation in the Holly Quran
...Show More Authors

The present study aims at representing the importance of Quranic readings in the interpretation of the meaning of the Holly Quran in Imam Al Wahidi’s interpretation “Al Wasiet”, declaring its meaning, and eliminating of the paradox which takes place when trying to understand the intention of the Almighty Allah in His Holly book. The study aims at:

1- Defining the paradox linguistically and in terminology according to the formatives or the fundamentalists, the scientist of interpretation and of the Quranic sciences.

2-Reasoning paradox in the Quranic readings: Believing in matters that disagree with the Holly Quran and Sunnis, variety of the subjects in the verses, disagreement of the place and the place for the vers

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Study for Commercial Fertilizer NPK (20:20:20+TE N: P: K) in Microalgae Cultivation at Different Aeration Periods
...Show More Authors

Recently, microalgae have become a promising source in the production of biofuel. However, the cost of production is still the main obstacle to develop of this type of source. Although there are many extensive studies on the requirements provided for the cultivation of the microalgae, the study of the process, via the variables that affect the cultivation of microalgae, being still one of the important tasks to improve the production of biofuel. The present article is a serious attempt to investigate of use commercial fertilizer NPK (20:20:20+TE N: P: K) as considered a cheap nutrient medium in growth Chlorella vulgaris by comparison with traditional nutrient (Chu.10 medium). In addition, the current study addresses effect of di

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 16 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Experimental Study for Commercial Fertilizer NPK (20:20:20+TE N: P: K) in Microalgae Cultivation at Different Aeration Periods
...Show More Authors

Recently, microalgae have become a promising source in the production of biofuel. However, the cost of production is still the main obstacle to develop of this type of source. Although there are many extensive studies on the requirements provided for the cultivation of the microalgae, the study of the process, via the variables that affect the cultivation of microalgae, being still one of the important tasks to improve the production of biofuel. The present article is a serious attempt to investigate of use commercial fertilizer NPK (20:20:20+TE N: P: K) as considered a cheap nutrient medium in growth Chlorella vulgaris by comparison with traditional nutrient (Chu.10 medium). In addition, the current study addresses effect of different spar

... Show More
Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
The Use Of Genetic Algorithm In Estimating The Parameter Of Finite Mixture Of Linear Regression
...Show More Authors

The estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To

... Show More
View Publication
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Pre-Processing and Surface Reconstruction of Points Cloud Based on Chord Angle Algorithm Technique
...Show More Authors

Abstract

Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t

... Show More
View Publication Preview PDF
Crossref (3)
Crossref