Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Ahmed Tariq Sadiq"'
Autor:
Jwan K. Alwan, Abir Jaafar Hussain, Dhafar Hamed Abd, Ahmed Tariq Sadiq, Mohamed Khalaf, Panos Liatsis
Publikováno v:
IEEE Access, Vol 9, Pp 24475-24484 (2021)
Sentiment analysis is an emerging research field that can be integrated with other domains, including data mining, natural language processing and machine learning. In political articles, it is difficult to understand and summarise the state or overa
Externí odkaz:
https://doaj.org/article/feab163bd4044897888ad19136d88359
Autor:
Ahmed Tariq Sadiq, Alaa Sameer Ali
Publikováno v:
Engineering and Technology Journal, Vol 34, Iss 4B, Pp 540-546 (2016)
Data Mining denotes mining knowledge from hugequantity of data. All algorithms of association rules mining include ‘first finding frequency of item sets, which accept a minimum support threshold, and then calculates confidence percentage for all k-
Externí odkaz:
https://doaj.org/article/f1ad458e55d842f4a7e10c0bb4fcf79f
Publikováno v:
Engineering and Technology Journal, Vol 28, Iss 11, Pp 2151-2161 (2010)
This paper considers a new approach to cryptanalysis based onsimulation of behavior of flocks of birds and schools of fish called ParticleSwarm Optimization (PSO). It is shown that such algorithm could be usedto break the key for a simple substitutio
Externí odkaz:
https://doaj.org/article/2983f8586be34e6aa843cae410e07a99
Publikováno v:
Engineering and Technology Journal, Vol 28, Iss 10, Pp 1967-1981 (2010)
Speed and complexity are two important properties in the block cipher.The block length of the block cipher controls these two aspects. The speedlimitation enforces the designer to build block cipher system as hardwareprototype. In the same manner, th
Externí odkaz:
https://doaj.org/article/2451a414e0484ce68bf418eeb23d5d65
Autor:
Ahmed Tariq Sadiq
Publikováno v:
Engineering and Technology Journal, Vol 28, Iss 3, Pp 500-508 (2010)
There are several heuristic search techniques, Tabu Search (TS) is one of them.TS based on generating the neighbor states but it has several problems in its work.This paper presents a new version of TS based on backtracking techniques (calledBTS) to
Externí odkaz:
https://doaj.org/article/7e00143886fb4ec684928ee58894467e
Autor:
Ahmed Tariq Sadiq, Amaal Ghazi Hamad
Publikováno v:
Engineering and Technology Journal, Vol 28, Iss 2, Pp 271-281 (2010)
Swarm-based algorithms such as Bees Algorithm BA have proven to be verypowerful computational techniques due to their search capabilities. Other methodswhich are useful in diverse application areas are simulated annealing, evolutionstrategies etc. Th
Externí odkaz:
https://doaj.org/article/8f437e29163e472880f1c3c46a4e7049
Publikováno v:
Engineering and Technology Journal, Vol 27, Iss 6, Pp 1064-1073 (2009)
The proposed system is based on embedded the heuristic search in DNA search algorithm so to make it more efficient and flexible. The HDNA system is constructed to improve the work of the DNA computing algorithm and enhance the measurement criteria of
Externí odkaz:
https://doaj.org/article/02f52375ab354f048f3e53868c37e282
Publikováno v:
مجلة جامعة الانبار للعلوم الصرفة, Vol 3, Iss 1, Pp 152-160 (2009)
Abstract:In this paper, a new technique for hiding text in a bitmap images will be present. The technique based on using an index of the dictionary representing the characters of the secret messages instead of the characters themselves. The technique
Externí odkaz:
https://doaj.org/article/a8648c57a4914a8b94477bb315720794
Publikováno v:
IOSR Journal of Computer Engineering. 16:08-12
Foreground detection is an essential task in many applications and a commonly used approach to obtain foreground objects from the background. Many techniques exist, but due to shadows and changes in illumination the detection of foreground objects fr
Autor:
Nasreen J. Kadhim, Ahmed Tariq Sadiq
Publikováno v:
Journal of Al-Nahrain University Science. 12:162-165
The group of the elliptic curve points forms an Abelian group, which is a suitable choice for constructing a good problem similar to Discrete Logarithm Problem. This paper introduces a brief overview of the Menezes-Vanestone Elliptic Curves Cryptosys