Preferred Language
Articles
/
iRdCLZIBVTCNdQwCOae5
A survey on video compression fast block matching algorithms
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
A Comparative Study of Various Intelligent Algorithms based Path Planning for Mobile Robots
...Show More Authors

In general, path-planning problem is one of most important task in the field of robotics. This paper describes the path-planning problem of mobile robot based on various metaheuristic algorithms. The suitable collision free path of a robot must satisfies certain optimization criteria such as feasibility, minimum path length, safety and smoothness and so on. In this research, various three approaches namely, PSO, Firefly and proposed hybrid FFCPSO are applied in static, known environment to solve the global path-planning problem in three cases. The first case used single mobile robot, the second case used three independent mobile robots and the third case applied three follow up mobile robot.  Simulation results, whi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Parallel Computing for Sorting Algorithms
...Show More Authors

The expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A SURVEY OF RUNNING CRAB SPIDERS PHILODROMIDAE (ARANEAE) OF ARMENIA
...Show More Authors

Twelve species of philodromid crab or running crab spiders (Philodromidae) have been recorded in Armenia. Nine species are new to the spider fauna of this country: Philodromus cespitum (Walckenaer, 1802); Philodromus emarginatus (Schrank, 1803), Philodromus rufus Walckenaer, 1826; Rhysodromus histrio (Latreille, 1819), Thanatus atratus Simon, 1875; Thanatus formicinus (Clerck, 1757); Thanatus imbecillus L. Koch, 1878; Thanatus vulgaris Simon, 1870 and Thanatus pictus L. Koch, 1881.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 31 2025
Journal Name
Al–bahith Al–a'alami
Evaluation in the Kurdish Media Institutions (A Descriptive Study Survey)
...Show More Authors

The importance of evaluation depends on many institutions, whether governmental or private, including media institutions, rely on the list to evaluate the weight of things and appreciation, as well as judging things, achievements, and everything related to the institution is concerned. Because through evaluation, institutions can recognize weaknesses and strengths. It is also an effective tool for management review, through which the institution can review everything related to planning and decision-making, leadership, incentives and other administrative matters.

Therefore, this study attempts to shed light on the evaluation process, its basics and its importance in general and in the Kurdish media institutions as a model in part

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2024
Journal Name
International Review On Modelling And Simulations (iremos)
Prosthetic Hand: a Brief Survey of Design and Actuation Technologies
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Electronics
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
...Show More Authors

As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily ex

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
International Dental Journal
A Survey of Systemic Antibiotic Prescription Patterns Amongst Iraqi Dentists
...Show More Authors

View Publication
Scopus (8)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Speech Compression Using Multecirculerletet Transform
...Show More Authors

Compressing the speech reduces the data storage requirements, leading to reducing the time of transmitting the digitized speech over long-haul links like internet. To obtain best performance in speech compression, wavelet transforms require filters that combine a number of desirable properties, such as orthogonality and symmetry.The MCT bases functions are derived from GHM bases function using 2D linear convolution .The fast computation algorithm methods introduced here added desirable features to the current transform. We further assess the performance of the MCT in speech compression application. This paper discusses the effect of using DWT and MCT (one and two dimension) on speech compression. DWT and MCT performances in terms of comp

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 23 2011
Journal Name
International Journal Of The Physical Sciences
Fast prediction of power transfer stability index based on radial basis function neural network
...Show More Authors

View Publication
Scopus (16)
Crossref (4)
Scopus Crossref