Preferred Language
Articles
/
QBiBhZgBVTCNdQwCEr6j
Digital Twin-Based Decision-Making Technique for Diagnostic 2D Environment Line Following Error of Mobile Robot
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Error Investigation for Free Form Surfaces in Bezier Techniques
...Show More Authors

Surface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch.  The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Coronavirus Disease Diagnosis, Care and Prevention (COVID-19) Based on Decision Support System
...Show More Authors

              Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Network And Computer Applications
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
...Show More Authors

View Publication
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Proposed Framework for Official Document Sharing and Verification in E-government Environment Based on Blockchain Technology
...Show More Authors

Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Lecture Notes In Electrical Engineering
Prosthetic Parts for Protecting Mobile Robots
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Sat Apr 30 2016
Journal Name
Environmental Science And Pollution Research
Risk-based prioritization of pharmaceuticals in the natural environment in Iraq
...Show More Authors

View Publication
Scopus (53)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Thu Jan 06 2022
Journal Name
Kuwait Journal Of Science
AVO analysis for high amplitude anomalies using 2D pre-stack seismic data
...Show More Authors

Amplitude variation with offset (AVO) analysis is an 1 efficient tool for hydrocarbon detection and identification of elastic rock properties and fluid types. It has been applied in the present study using reprocessed pre-stack 2D seismic data (1992, Caulerpa) from north-west of the Bonaparte Basin, Australia. The AVO response along the 2D pre-stack seismic data in the Laminaria High NW shelf of Australia was also investigated. Three hypotheses were suggested to investigate the AVO behaviour of the amplitude anomalies in which three different factors; fluid substitution, porosity and thickness (Wedge model) were tested. The AVO models with the synthetic gathers were analysed using log information to find which of these is the

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref