Volume 18 Issue 1
Published: 2025-06-25
Contents
Research Paper
A Modified Sine Cosine Algorithm Based on A Novel Locally Weighted Method for Global Optimization Problems
Shahad Ibrahim Mohammed, Nazar Khalaf Hussein, Mohammed Abdulrazaq Alkahya
The sine cosine algorithm (SCA), a recently discovered population-based optimization technique, is used to resolve optimization issues. In this research, the study proposes employing the LWSCA...
Appling A Hybrid Encryption Algorithm in Cloud Computing
Esraa Khalid Alobaydi, Muna M.T. Jawhar,
The rapid digital development has led to a steady increase in the use of cloud storage as a primary means of saving and sharing data and files. This development brought major challenges in the...
Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
Omar Abed Najm, Ahmed Sami Nori,
Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers. Secret communication in...
Enhancing Reliability Engineering Through Weibull Distribution in R
Sameera Abdulsalam Othman,
Accelerated life testing is a fundamental practice in reliability engineering, making the evaluation of component or device performance over extended lifetimes impractical to encounter during...
Semi-h-Open Sets and Semi-h-Continuity in Topological Spaces
Barah Mahmood Sulaiman,
In this study, we generalized two known open sets called semi-open and h-open sets to find a new type called semi-h-open set in topological space We have presented the relationship of several...
Numerical Solution for fluid flow in Horizontal and Inclined Cavities
Iman Hashim Al-obaidi,
This study demonstrates how to control fluid flow in inclined and horizontal cavities. The equations governing the problem are established, including the two-dimensional nonlinear partial...
Key Generation and Testing Based on Biometrics
shahd Abdulrhman Hasso, Alaa Aamer AbdulRaheeM,
Creating and testing a biometric key is a critical process used for security and identity verification .When using biometric traits such as fingerprints, facial features, iris patterns, earprints,...
Solving Newell-Whitehead-Segel Equation By using Elzaki Transform and its inverse with The Homotopy Perturbation Method
Mohammed Mustafa Alsofey, Abdulghafor M. Al-Rozbayani,
This research is a combination of the homotopy perturbation method with Elzaki transform method and Elzaki inverse to solve some nonlinear partial differential equations. Where the method Elzaki...
Adaptive Steganography Using Improve Bit-plane Complexity Segmentation
Noor Gassan Abdullah, shahd Abdulrhman Hasso,
One of the primary challenges in Internet data transmission lies in safeguarding data from unauthorized access by potential attackers. The goal of content-adaptive steganography is to conceal data...
Strongly Invo. T- Clean Rings
Rand Kanaan Alneamy, Nazar H. Shuker,
In this paper, we present the idea of a strongly invo. T-clean rings, which we define as rings with every a in R having the formula a = t + v, where t is a tripotent and v is an order two unit that...
Software Defect Prediction Using Extreme Gradient Boosting(XGBoost) with Tune Hyperparameter
Tariq Najim AL-Hadidi, Safwan Omar Hasoon
Software applications have become widely spread in an unprecedented manner in our daily lives, controlling some of the most sensitive and critical aspects within institutions. Examples include...
Land Ownership Management System in Mosul City
Walaa Assim ALhadidiu, Shayma Mustafa Mohi-Aldeen,
Technological development in all areas of life has played an effective role in the development of electronic systems. They have become one of the necessary modern building systems used by the...
Review Paper
The Multilevel Encryption Model: A review
Mais Irreem A kamal, Laheeb Mohammad Ibrahim,
Multilevel encryption is a system used to protect sensitive data and information with multiple overlapping encryption methods. This system aims to increase the level of security by adding multiple...
Braille Character Recognition System: Review
Rusul Hussein Hasan, Inaam Salman Aboud, Rasha Majid Hassoo,
The Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell...
Application of ic—open Sets in Topologies Via Ideals
Rana Ibraheem AL -jaheishi, Amir AL- siraj,
In this paper, new kinds of open sets inside ideal topological spaces are introduced; they are called ic - I - open,icc - I -open,weakly ic - I - open and weakly icc - I - open. Some properties and...
On Types of Invo Clean Rings: Review
Mohammed Th. Al-Neima, Raida D. Mahmood,
In this paper, three types of rings were reviewed: invo-clean, invo-t-clean and invo-k-clean, the ring invo-clean is invo-t-clean and invo-k-clean. Since invo-t-clean ring is invo-k-clean when k=3....
The Role of Artificial Intelligence in Enhancing Cyber Security using Deep Learning Techniques: A Review
Abeer Abdulkhalik Thanoon Alyoons, sabren hani altai,
Learning AI is used to detect various cyber-attacks, malicious attacks and unusual future threats in the network. Notice the pattern in which any illegal or suspicious activities behave, recognize...