Preferred Language
Articles
/
CBai3okBVTCNdQwCMI7I
Design and implementation of a smart home automation system based on global system for mobile communications
...Show More Authors

Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an electric fan is used, and a sounding buzzer is used as well – and that is through the utilization of Short Message Services (SMS). Besides that, an Arduino board has been integrated with a number of sensors such as a motion sensor, a temperature sensor, and a screen for displaying required information to the user which indicates whatever the system is doing, where this data includes the state of appliances, where the Arduino board can control the home appliances through the relay board that accepts low power signals, and based upon them, it activates high power devices.

Scopus Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Cultural context and its implications for graphic design
...Show More Authors

dictates the need to study the cultural aspects of the context and the consequent relations between the person and the objective environment surrounding him, as the philosophical understanding of the role of culture has led to the emergence of new theoretical interpretations of design that are organically linked with the development of society, especially that the development of the human environment philosophically and culturally is linked to the philosophical perception of its role in Culture as a precondition for new theoretical interpretations of design.
From the above, this problem can be studied by defining the following question (What are the implications of the cultural context in graphic design)?
The research included

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Fractal and its implications for industrial product design
...Show More Authors

The current research dealt with the rapid development of industrial product design in recent times, and this development in the field of design led to the emergence of modern trends in many terms and theories to direct greater interest in the cognitive foundations of design and its relationship with the components of other natural sciences, and despite the impressive technological development, nature remains With its content of formative values and structural dimensions, it is the first source of inspiration and the source of all modern mathematical sciences and theories, as God made them tend towards organization to continue to provide us with endless inspiration. Hence, the fractional one, which is an important part of dedicating the d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
ENGLISH FOR SPECIFIC PURPOSES (ESP) AND SYLLABUS DESIGN
...Show More Authors

This research has discussed the origins of ESP, addressed key notions about ESP and examined issues in ESP syllabus design. The content of the paper was determined by a need identified based on my  experience as an ESL instructor designing and delivering the content-based language program - Language Preparation for the Cadets and Employment in the Iraqi  College of Police . These issues, where possible, have been supported by current and pertinent academic literature. It is my sincerest hope that these observations will lend insight into the challenges facing the ESL instructor acting as ESP syllabus developer.

View Publication Preview PDF
Publication Date
Tue Jun 11 2024
Journal Name
International Journal Of Civil Engineering
Strength Evaluation of CFRP-Strengthened RC Slab-Beams System by Load Test to Satisfy the Safety Requirements: A Case Study
...Show More Authors

The primary goal of in-situ load testing is to evaluate the safety and performance of a structural system under particular loading conditions. Advancements in building techniques, analytical tools, and monitoring instruments are prompting the evaluation of the appropriate loading value, loading process, and examination criteria. The procedure for testing reinforced concrete (RC) structures on-site, as outlined in the ACI Building Code, involves conducting a 24-h load test and applying specific evaluation criteria. This article detailed a retrofitting project for an RC slab-beams system by utilizing carbon fiber-reinforced polymer (CFRP) sheets to strengthen the structure following a fire incident. The RC structure showed indicators of deter

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Effect of Design Parameters and Support Conditions on Natural Frequency of Pipe Excited by a Turbulent Internal Flow
...Show More Authors

In this study, the effect of design parameters such as pipe diameter, pipe wall thickness, pipe material and the effect of fluid velocity on the natural frequency of fluid-structure interaction in straight pipe conveying fully developed turbulent flow were investigate numerically,analytically and experimentally. Also the effect of support conditions, simply-simply and clamped-clamped was investigated. Experimentally, pipe vibrations were characterized by accelerometer mounted on the pipe wall. The natural frequencies of vibration were analyzed by using Fast Fourier Transformer (FFT). Five test sections of two different pipe diameters of 76.2
mm and 50.8 mm with two pipe thicknesses of 3.7 mm and 2.4 mm and two pipe materials,stainles

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Tactics An Approach to Strategic Agility A field study in a sample of mobile operators in Iraq
...Show More Authors

The current research dealt with the issue of organizational skillfulness as an entry point to reach strategic agility. The study has been tested in Iraq's mobile operators - Asia Cell, Zain Iraq and Cork Telecom. The study was applied to a sample of (93) managers distributed at various levels of management (board members, general managers, commissioners, department managers, people managers, unit managers, office managers). The survey used the questionnaire as a key tool for collecting data and information as well as personal interviews. It has sought to test a number of hypotheses related to correlation and influence relationships between the variables of the study, in order to answer the questions related to the problem of stud

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors