Zobrazeno 1 - 10
of 220
pro vyhledávání: '"T Sadiq"'
Publikováno v:
ARO-The Scientific Journal of Koya University, Vol 12, Iss 2 (2024)
Flexible job shop scheduling problem (FJSSP) is a complex and challenging problem that plays a crucial role in industrial and manufacturing production. FJSSP is an expansion of the standard job shop scheduling problem (JSSP). One of FJSSP’s objecti
Externí odkaz:
https://doaj.org/article/239ffb1c5f284a29ac136fdf7bf60b39
Publikováno v:
ARO-The Scientific Journal of Koya University, Vol 12, Iss 2 (2024)
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently w
Externí odkaz:
https://doaj.org/article/8d2ec9c59ece4a11b1d04f4c5476da8e
Publikováno v:
Baghdad Science Journal, Vol 21, Iss 5 (2024)
Association Rules Mining (ARM) forms one of the important data mining techniques. The classical methods that were previously worked on by researchers have become ineffective to deal with the steady growth of databases, which prompted us to use the mi
Externí odkaz:
https://doaj.org/article/41a74a2062f848479241022aeec3ce32
Publikováno v:
Iraqi Journal for Computers and Informatics, Vol 49, Iss 2, Pp 93-99 (2023)
The rapid growth and development of the Internet of Things (IoT) have had an important impact on various industries, including smart cities, the medical profession, autos, and logistics tracking. However, with the benefits of the IoT come security co
Externí odkaz:
https://doaj.org/article/c46f3a34441046caa874b1e14b5c8e04
Publikováno v:
Algorithms, Vol 17, Iss 1, p 3 (2023)
The area coverage problem solution is one of the vital research areas which can benefit from swarm robotics. The greatest challenge to the swarm robotics system is to complete the task of covering an area effectively. Many domains where area coverage
Externí odkaz:
https://doaj.org/article/02233e6427374f3eba9265aa28dc79fc
Publikováno v:
Baghdad Science Journal, Vol 20, Iss 2 (2023)
Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to impr
Externí odkaz:
https://doaj.org/article/3d56999cc2db4a149596aa3872da82f2
Publikováno v:
ARO-The Scientific Journal of Koya University, Vol 10, Iss 2 (2022)
Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats. Hence, cipher algorithms in the core of the information secu
Externí odkaz:
https://doaj.org/article/80dde5f2464a444aae280acbddd4221d
Publikováno v:
Baghdad Science Journal, Vol 19, Iss 6(Suppl.) (2022)
Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is p
Externí odkaz:
https://doaj.org/article/81ac293f56bc4397aa203c2bfbcab1c3
Publikováno v:
ARO-The Scientific Journal of Koya University, Vol 10, Iss 1 (2022)
Human body posture recognition has become the focus of many researchers in recent years. Recognition of body posture is used in various applications, including surveillance, security, and health monitoring. However, these systems that determine the b
Externí odkaz:
https://doaj.org/article/6901ed2eeb204c65a0156fe8eaf1c9e8
Publikováno v:
Iraqi Journal for Computers and Informatics, Vol 46, Iss 1, Pp 1-11 (2020)
Now day’s text Classification and Sentiment analysis is considered as one of the popular Natural Language Processing (NLP) tasks. This kind of technique plays significant role in human activities and has impact on the daily behaviours. Each article
Externí odkaz:
https://doaj.org/article/153ac49ec2eb441dafc8b0d8d33c4394