{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T19:38:14Z","timestamp":1757705894035,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,5]],"date-time":"2021-04-05T00:00:00Z","timestamp":1617580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,5]]},"DOI":"10.1145\/3460620.3460757","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T10:33:05Z","timestamp":1622802785000},"page":"213-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Hybrid solution of challenges future problems in the new generation of the artificial intelligence industry used operations research industrial processes"],"prefix":"10.1145","author":[{"given":"Tareq Abed","family":"Mohammed","sequence":"first","affiliation":[{"name":"Imam Ja'afar Al-Sadiq University, Iraq"}]},{"given":"Mohammed N.","family":"Qasim","sequence":"additional","affiliation":[{"name":"Imam Ja'afar Al-Sadiq University, Iraq"}]},{"given":"Oguz","family":"Bayat","sequence":"additional","affiliation":[{"name":"AltenBas, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14710\/ijred.8.1.57-64"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"e_1_3_2_1_3_1","unstructured":"Abdullah Alhaj and Shadi\u00a0A. Aljawarneh. 2016. Advanced Research on Software Security Design and Applications. 453-458\u00a0pages. Issue 4. http:\/\/jucs.org\/jucs_22_4\/advanced_research_on_software\/jucs_22_04_0453_0458_editorial.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Abdullah Alhaj and Shadi\u00a0A. Aljawarneh. 2017. An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking Sector. https:\/\/doi.org\/10.4018\/978-1-5225-0864-9.ch010","DOI":"10.4018\/978-1-5225-0864-9.ch010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Abdullah Alhaj and Shadi\u00a0A. Aljawarneh. 2017. An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking Sector. https:\/\/doi.org\/10.4018\/978-1-5225-0864-9.ch010","DOI":"10.4018\/978-1-5225-0864-9.ch010"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70026-5"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Shadi aljawarneh. 2016. Emerging Challenges Security Issues and Technologies in Online Banking Systems. 90-112\u00a0pages. https:\/\/doi.org\/10.4018\/978-1-5225-0864-9","DOI":"10.4018\/978-1-5225-0864-9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Shadi aljawarneh. 2017. Emerging Challenges Security Issues and Technologies in Online Banking Systems. 90-112\u00a0pages. https:\/\/doi.org\/10.4018\/978-1-5225-0864-9","DOI":"10.4018\/978-1-5225-0864-9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Shadi Aljawarneh and Manisha Malhotra (Eds.). 2018. Critical research on scalability and security issues in virtual cloud environments. Information Science Reference Hershey PA.","DOI":"10.4018\/978-1-5225-3029-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234698.3234735"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330458"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330457"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3330431.3330457"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745355"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280021"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2397-3"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4333-y"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.005"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.01.020"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280025"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-019-09594-8"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273100"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3776-7"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-018-3776-7"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273113"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.013"},{"key":"e_1_3_2_1_27_1","unstructured":"SelimiBesnik\u00a0Selimi Dhurat\u00eb\u00a0HyseniBetim CicoBetim\u00a0CicoBesnik. 2016. Conception design and implementation of an interface for security in cloud controlled by the end user. https:\/\/www.impactio.com\/publication\/2873816018"},{"key":"e_1_3_2_1_28_1","volume-title":"White Paper. weforum. Retrieved","author":"Leurent","year":"2021","unstructured":"Leurent H and Boer\u00a0E D. 2019. Fourth Industrial Revolution Beacons of Technology and Innovation in Manufacturing, White Paper. weforum. Retrieved May 3, 2021 from http:\/\/www3.weforum.org\/docs\/WEF_4IR_Beacons_of_Technology_and_Innovation_in_Manufacturing_report_2019.pdf"},{"key":"e_1_3_2_1_29_1","volume-title":"Artificial intelligence, automation, and the economy","author":"House W.","year":"2021","unstructured":"W. House. 2016. Artificial intelligence, automation, and the economy. The White House President OBAMA. Retrieved May 3, 2021 from https:\/\/obamawhitehouse.archives.gov\/blog\/2016\/12\/20\/artificial-intelligence-automation-and-economy"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.05.022"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2018.09.002"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12528-019-09209-y"},{"key":"e_1_3_2_1_34_1","volume-title":"The 6th International Conference on Networked Computing and Advanced Information Management. IEEE, USA, 341\u2013345","author":"Masadeh R.","year":"2010","unstructured":"Shadi\u00a0R. Masadeh, Shadi Aljawarneh, Nedal Turab, and Aymen\u00a0M. Abuerrub. 2010. A comparison of data encryption algorithms with the proposed algorithm: Wireless security. In The 6th International Conference on Networked Computing and Advanced Information Management. IEEE, USA, 341\u2013345."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833031"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCES.2018.8340520"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368691.3368717"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280029"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368691.3368713"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280033"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279996.3280032"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-015-0037-5"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.2174\/2213275912666181214152207"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833053"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIE.2017.087013"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2017.8273098"},{"volume-title":"Artificial Intelligence on Fashion and Textiles, Wai\u00a0Keung Wong (Ed.)","author":"Safi H.","key":"e_1_3_2_1_47_1","unstructured":"Hayder\u00a0H. Safi, Tareq\u00a0Abed Mohammed, and Zena\u00a0Fawzi Al-Qubbanchi. 2019. Minimize the Cost Function in Multiple Objective Optimization by Using NSGA-II. In Artificial Intelligence on Fashion and Textiles, Wai\u00a0Keung Wong (Ed.). Springer International Publishing, Cham, 145\u2013152."},{"key":"e_1_3_2_1_48_1","first-page":"6","article-title":"Intelligent Enhancement of Organization Work Flow and Work Scheduling Using Machine Learning Approach Tree Algorithm","volume":"18","author":"Th Naeem","year":"2018","unstructured":"Naeem Th.\u00a0Yousir Tareq Abed\u00a0Mohammed, Yaser Issam\u00a0Hamodi. 2018. Intelligent Enhancement of Organization Work Flow and Work Scheduling Using Machine Learning Approach Tree Algorithm. Nature 18, 6 (May 2018), 87\u201390. http:\/\/search.ijcsns.org\/07book\/html\/201806\/201806011.html","journal-title":"Nature"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2017.04.027"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-019-09590-y"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10699-019-09590-y"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.12.017"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2018.1444806"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.024"}],"event":{"name":"DATA'21: International Conference on Data Science, E-learning and Information Systems 2021","acronym":"DATA'21","location":"Ma'an Jordan"},"container-title":["International Conference on Data Science, E-learning and Information Systems 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460620.3460757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:30:38Z","timestamp":1757543438000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460620.3460757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,5]]},"references-count":54,"alternative-id":["10.1145\/3460620.3460757","10.1145\/3460620"],"URL":"https:\/\/doi.org\/10.1145\/3460620.3460757","relation":{},"subject":[],"published":{"date-parts":[[2021,4,5]]},"assertion":[{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}