Preferred Language
Articles
/
4xeq644BVTCNdQwC9Flj
The Mediating Role of Knowledge Sharing on Relationship between IT Capability and IT Support as Predictors of Innovation Performance: An Empirical Study on Mobile Companies in Iraq
...Show More Authors

Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
Consumer Subjective Values and their Reflection on Fashion Design: وسن خليل إبراهيم
...Show More Authors

This paper deals with the subjective reflections of consumer values ​​on fashion design. The   consumer self is determined by the consumer's idea of ​​himself, according to the intellectual, spiritual and social values, and these values ​​take their intellectual reflection in the form of material values ​​that the consumer finds in fashion design. These values ​​are based on considerations between what is intellectual represented by the values ​​of the consumer, and what is material determined by the fashion design, which also proceed from values that are visible or implied in costume design, such as the function, beauty and symbol. The   consumer self gets its material image represented in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Fingerprints Identification and Verification Based on Local Density Distribution with Rotation Compensation
...Show More Authors

The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Int. J. Advance Soft Compu. Appl,
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Publication Date
Tue Jun 14 2022
Journal Name
Iraqi Journal Of Industrial Research
Biofuel Production and Its Impact on Global Food Security: A Review Article
...Show More Authors

The aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 07 2021
Journal Name
Rimak International Journal And Humanities And Social Sciences
children were exposed to animation on specialized satellite channels and verified gratifications
...Show More Authors

Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management
...Show More Authors

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Baghdad Science Journal
Water flow velocity and oxide film formation effect on copper pipe corrosion
...Show More Authors

An overall mathematical model for copper pipe corrosion in flowing water was derived based on mass transfer fundamentals where we introduced the effects of boundary layer velocity, bulk flow velocity and the surface oxide protective film on the corrosion rate. A set of experiments were conducted in a straight 10mm diameter copper pipe, flow of water include six velocities of maximum value 7.33m/sec at 200C and 350C. The good agreement between the calculated and experimental corrosion rate values were achieved , the agreement reached 92% .

View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Fuzzy Convergence Sequence and Fuzzy Compact Operators on Standard Fuzzy Normed Spaces
...Show More Authors

The main purpose of this work is to introduce some types of fuzzy convergence sequences of operators defined on a standard fuzzy normed space (SFN-spaces) and investigate some properties and relationships between these concepts. Firstly, the definition of weak fuzzy convergence sequence in terms of fuzzy bounded linear functional is given. Then the notions of weakly and strongly fuzzy convergence sequences of operators  are introduced and essential theorems related to these concepts are proved. In particular, if ( ) is a strongly fuzzy convergent sequence with a limit  where linear operator from complete standard fuzzy normed space  into a standard fuzzy normed space  then  belongs to the set of all fuzzy bounded linear operators

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More