Technology is an important factor for achieving architecture as an impact and vulnerability. It represents one of the significant elements in creating the intellectual framework, as well as having its own intellectual breakdown, while values constitute the most important and obviously factor of the community's intellectual. Research aims was determined accordingly by: investigating the role and impact of values and their relationship to technology in architecture.
In this context, the research investigated values and technology in architecture, through discussing their aspects and dimensions in architecture. In the context of values, the research discussed their concept and the related ones to have a concrete def
... Show MoreA new mathematical model describing the motion of manned maneuvering targets is presented. This model is simple to be implemented and closely represents the motion of maneuvering targets. The target maneuver or acceleration is correlated in time. Optimal Kalman filter is used as a tracking filter which results in effective tracker that prevents the loss of track or filter divergency that often occurs with conventional tracking filter when the target performs a moderate or heavy maneuver. Computer simulation studies show that the proposed tracker provides sufficient accuracy.
The most used material in the world after water is concrete, which depends mainly on its manufacture of cement leading to the emission of carbon dioxide (CO2), flying dust, and other greenhouse gasses (GHGs) resulting in pollution of the atmosphere. The emission of CO2 from cement production is approximately 5% of the global anthropogenic CO2. This research focuses on investigating the amount of CO2 emission from the Iraqi General Cement Company plants includes the cement factories of Kirkuk, Al-Qa’em, Fallujah, and Kubaisa, using the GHGs Protocol Measures Program (specifically cement based-method).
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThe financial markets are one of the sectors whose data is characterized by continuous movement in most of the times and it is constantly changing, so it is difficult to predict its trends , and this leads to the need of methods , means and techniques for making decisions, and that pushes investors and analysts in the financial markets to use various and different methods in order to reach at predicting the movement of the direction of the financial markets. In order to reach the goal of making decisions in different investments, where the algorithm of the support vector machine and the CART regression tree algorithm are used to classify the stock data in order to determine
... Show MoreThis research aims to study a range of yet and future variables that can affect human resources in Iraq and public organizations that influence the size of each, and the extent of its contribution to the development of human resources through the National Investment Commission of Baghdad. The identified research problem in a set of questions was the most important, what are the variables that help in the development of human resources to the Investment Commission of Baghdad theme of the search, in order to achieve the goal of research and answer questions about the problem, applied research on both the research community's (55) individual executives and employees.
Researcher has identified a r
... Show More