Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Renas R. Asaad"'
Publikováno v:
International Research Journal of Science, Technology, Education, and Management, Vol 1, Iss 1, Pp 44-56 (2021)
The complexity of real-world problems motivated researchers to innovate efficient problem-solving techniques. Generally natural Inspired, Bio Inspired, Metaheuristics based on evolutionary computation and swarm intelligence algorithms have been frequ
Externí odkaz:
https://doaj.org/article/997e85792c9148329471b2392efb4fe1
Autor:
Renas R. Asaad, Vaman Ashqi Saeed
Publikováno v:
Applied computing Journal. :227-244
Internet security is one of the most pressing concerns in the twenty-first century when taken into consideration with other online concerns. This is because technological progress, the growth of communications, and the development of the cyber-Intern
Publikováno v:
Asian Journal of Research in Computer Science. :22-32
Swarm based optimization algorithms are a collection of intelligent techniques in the field of Artificial Intelligence (AI) were developed for simulating the intelligent behavior of animals. Over the years ago, problems complexity increased in a mean
Autor:
Renas R. Asaad
Publikováno v:
ICONTECH INTERNATIONAL JOURNAL. 5:18-24
In this article, we'll learn about the concepts of instruction organized in computer organization. On the premise of accessibility of ALU operands sorts of CPU organization is moreover endorsed in this article. When the constructing agent forms an In
Publikováno v:
Qubahan Academic Journal. 1:17-20
Recent days, the concept of data mining and the need for it, its objectives and its uses in various fields, explain its procedures and tools, the type of data that is mined, and the structural structure of that data while simplifying the concept of d
Autor:
Renas R. Asaad
Publikováno v:
Qubahan Academic Journal. 1:1-4
Recently, we humans integrate into the world of our smart phones and our portable electronic devices to the point that that world can numb us in one way or another and separate us from the real world, so that we and the generations that come after us
Autor:
Renas R. Asaad
Publikováno v:
Academic Journal of Nawroz University. 10:7-12
This paper implements a wireless attack technique by cracking the password on kali Linux OS using Hashcat technique. This study identifies the security weakness, using brute-force attack for online attacking and straight attack for offline attacking.
Autor:
Renas R. Asaad
Publikováno v:
ICONTECH INTERNATIONAL JOURNAL. 4:28-34
Currently, viruses are the most dangerous things that happens to computers, whether by transferring data or from the Internet cloud. This research paper shows how to implement a virus that has an ability to move and fortify itself from deletion or de
Publikováno v:
Academic Journal of Nawroz University. 9:1-7
Nowadays, the amount of giving birth is increasing by amount of death, these days there are have many death causes (diseases) , in different ways, and there's different death causes in every region, In north of Iraq there is a governorate called Duho
Publikováno v:
Academic Journal of Nawroz University. 9:25-33
Today Big Data, is any set of data that is larger than the capacity to be processed using traditional database tools to capture, share, transfer, store, manage and analyze within an acceptable time frame; from the point of view of service providers,