Preferred Language
Articles
/
pBbuCocBVTCNdQwCojK2
Gamipog: A deterministic genetic multi-parameter-order strategy for the generation of variabLE STRENGTH COVERING ARRAYS
...Show More Authors

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
The Constant and Variable in Theatrical Shows Music for the Department of Arts Education: مروة شاكر رضا الشيباني
...Show More Authors

This study is concerned with the topic of the constant and the variable within the artistic theatrical phenomenon and specifically the accompanying music for the movements, scenes and dramatized idea, which translates the Iraqi environments (the serious ones). The researcher, here, tries to determine those variables and constants as a methodological scientific study to serve the scientific and cultural institutions and contribute in settling them intellectually, and entering them in the academic environments that depend on studying the artistic associations between the theatrical science and musical science. We find that this study which addresses the topic (the constant and the variable in the theatrical show music for the department of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
A Survey on Image Caption Generation in Various Languages
...Show More Authors

      The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o

... Show More
View Publication
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measurement of the effect of some macroeconomic variable on the phenomenon of unemployment in Iraq For the period 2003-2018
...Show More Authors

The aim of this research is analysis the effect of the changes in (GDA, g, inflation) at average and standard economic curriculum in composition of the models, depending on SPSS program in analysis, and according to available date from central bank of Iraq and during the period from 2003 to 2018 and by using OLS and estimate of the equation and the results showed a statistical significance relation in incorporeal level 5% and the R2 value equal  to 92.1 refer to the changes in independent variables explain 92% of changes of unemployment and the independent variables effect are very limit depend on estimated parameters in the model and respectively (0.986,0.229,-0.060), the research recommended necessity to active the inve

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
2019 First International Conference Of Computer And Applied Sciences (cas)
A Comparison for Some of the estimation methods of the Parallel Stress-Strength model In the case of Inverse Rayleigh Distribution
...Show More Authors

View Publication
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Mon Apr 05 2021
Journal Name
Solid State Technology
Genetic Algorithms in Construction Project Management: A Review
...Show More Authors

Genetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problem

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Ieee Access
On Computational Aspects of Tchebichef Polynomials for Higher Polynomial Order
...Show More Authors

View Publication
Scopus (53)
Crossref (54)
Scopus Clarivate Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Requirements of Formulating a National Strategy for Developing the Cybersecurity System in Iraq According to GCI.v4(2019) Index
...Show More Authors

The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation of rock strength from sonic log for Buzurgan oil field: A Comparison study
...Show More Authors

It is very difficult to obtain the value of a rock strength along the wellbore.  The value of Rock strength utilizing to perform different analysis, for example, preventing failure of the wellbore, deciding a completion design and, control the production of sand.  In this study, utilizing sonic log data from (Bu-50) and (BU-47) wells at Buzurgan oil field.  Five formations have been studied (Mishrif, Sadia, Middle lower Kirkuk, Upper Kirkuk, and Jaddala) Firstly, calculated unconfined compressive strength (UCS) for each formation, using a sonic log method.  Then, the derived confined compressive rock strengthens from (UCS) by entering the effect of bore and hydrostatic pressure for each formation.  Evaluations th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref