Preferred Language
Articles
/
ghfcL48BVTCNdQwC-V5h
Nature-inspired optimization algorithms for community detection in complex networks: a review and future trends
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Computer Networks, Big Data And Iot
A Comprehensive Study of Various DC Faults and Detection Methods in Photovoltaic System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Detection Of Candida Albicans Responsible For Vulvovaginitis In Women
...Show More Authors

Background: The vaginal microbial ecosystem stability preclude many other organisms but sometimes the vaginal micro biota is disturbed and this cause change in the normal

balance causing symptoms of vulvuvaginitis like abnormal or increased vaginal discharge, redness and itching.

Objective: To prove C. albicans presence in their vagina clinically and laboratory by culture of vaginal swab on two media.

Type of the study: This study is a case control study

Methods: This study is a case control study in which 100 clinically patient women admitted to maternity hospital in kalar city and khanaqin hospital during the pe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Pharm. Sci. & Res.
Review and Description for Theretra alecto Boisduval 1827, (Lepidoptera: Sphingidae) in Iraq
...Show More Authors

The current study included a review of the registration and description of the Theretra alecto Boi, 1827 (Levant hawk moth), samples were collected from various areas of the Baghdad belt and the provinces of the Middle Euphrates, confirmation in the description was on the most important parts of the body included the head and it's appendages, pronotum, wings as well as male and female genitalia. The morphological characteristics under study were enhanced by illustrations and images. Information on the locations and date of the collection was also confirmed. This study aims to identify the most important characteristics of the diagnosis of the species and the review of appearance variations, especially the analytical style of wings, coupling

... Show More
Publication Date
Tue Nov 19 2024
Journal Name
Aip Conference Proceedings
CT scan and deep learning for COVID-19 detection
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Nov 18 2025
Journal Name
Al–bahith Al–a'alami
POLITICAL TRENDS OF CARICATURE: (in Al-Sharq Al-Awsat Newspaper)
...Show More Authors

 

The importance of studying the political trends of caricature in Al-Sharq Al-Awsat Newspaper comes from the importance of this magical and satirical journalistic art, as it addresses various trends with satirical criticism that exposes the negative sides and affects the reader’s consciousness in a way or another by contributing to the public opinion about these issues and topics that affect people's lives and their future. Therefore, this art is no less important than the other arts, on the contrary, it complements the other arts and also contributes to the importance of Journalism. Also, the choice of Al-Sharq Al-Awsat Newspaper as being one of the most widely circulated and prominent Arab newspapers, t

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 26 2019
Journal Name
Processes
Fine-Tuning Meta-Heuristic Algorithm for Global Optimization
...Show More Authors

This paper proposes a novel meta-heuristic optimization algorithm called the fine-tuning meta-heuristic algorithm (FTMA) for solving global optimization problems. In this algorithm, the solutions are fine-tuned using the fundamental steps in meta-heuristic optimization, namely, exploration, exploitation, and randomization, in such a way that if one step improves the solution, then it is unnecessary to execute the remaining steps. The performance of the proposed FTMA has been compared with that of five other optimization algorithms over ten benchmark test functions. Nine of them are well-known and already exist in the literature, while the tenth one is proposed by the authors and introduced in this article. One test trial was shown t

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Thu Mar 23 2023
Journal Name
Journal Of Applied Science And Engineering
Strong Fenchel Duality for Evenly Convex Optimization Problems
...Show More Authors

Among a variety of approaches introduced in the literature to establish duality theory, Fenchel duality was of great importance in convex analysis and optimization. In this paper we establish some conditions to obtain classical strong Fenchel duality for evenly convex optimization problems defined in infinite dimensional spaces. The objective function of the primal problem is a family of (possible) infinite even convex functions. The strong duality conditions we present are based on the consideration of the epigraphs of the c-conjugate of the dual objective functions and the ε-c-subdifferential of the primal objective functions.

View Publication
Scopus (1)
Scopus Clarivate
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref