Preferred Language
Articles
/
WRdZro0BVTCNdQwCcBgT
Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
...Show More Authors

Crossref
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Assessing Close Range Photogrammetric Approach to Evaluate Pavement Surface Condition
...Show More Authors

The aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4.  The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determinatio

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Construction And Building Materials
Linear viscous approach to predict rut depth in asphalt mixtures
...Show More Authors

Rutting in asphalt mixtures is a very common type of distress. It occurs due to the heavy load applied and slow movement of traffic. Rutting needs to be predicted to avoid major deformation to the pavement. A simple linear viscous method is used in this paper to predict the rutting in asphalt mixtures by using a multi-layer linear computer programme (BISAR). The material properties were derived from the Repeated Load Axial Test (RLAT) and represented by a strain-dependent axial viscosity. The axial viscosity was used in an incremental multi-layer linear viscous analysis to calculate the deformation rate during each increment, and therefore the overall development of rutting. The method has been applied for six mixtures and at different tem

... Show More
View Publication Preview PDF
Crossref (13)
Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Guiding Mobile Robot by Applying Fuzzy Approach on Sonar Sensors
...Show More Authors

This study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program  uses th

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Abu Ubaidah's interpretative approach to the metaphor of the Qur’an
...Show More Authors

In the name of of Allah the Merciful
        Praise be to God, and blessings and peace be upon the Messenger of God, Muhammad, and upon his family and his family and peace, and after:
 The honor of every knowledge of honor is related to it, and since the science of interpretation is related to the Book of God Almighty; it is considered one of the most noble and longest of sciences, and this science began long ago as the early ages of Islam have expanded the Islamic state, and people entered the religion of God in cohorts, and the mixture mixed In tongues, and people did not know much about the meanings of the Qur’an, so the need for authorship in this great knowledge was severe, and pe

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Materials Chemistry A
A novel approach to fabricate zeolite membranes for pervaporation processes
...Show More Authors

A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.

View Publication
Scopus (26)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Elzaki transform decomposition approach to solve Riccati matrix differential equations
...Show More Authors

Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.

Scopus (4)
Scopus
Publication Date
Tue Jan 19 2016
Journal Name
Journal Of Engineering
Assessing Close Range Photogrammetric Approach to Evaluate Pavement Surface Condition
...Show More Authors

The aim of this research is to adopt a close range photogrammetric approach to evaluate the pavement surface condition, and compare the results with visual measurements. This research is carried out on the road of Baghdad University campus in AL-Jaderiyiah for evaluating the scaling, surface texture for Portland cement concrete and rutting, surface texture for asphalt concrete pavement. Eighty five stereo images of pavement distresses were captured perpendicular to the surface using a DSLR camera. Photogrammetric process was carried out by using ERDAS IMAGINE V.8.4. The results were modeled by using a relationship between the photogrammetric and visual techniques and selected the highest coefficient of determination (R2). The first techniqu

... Show More
Publication Date
Sat Aug 16 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref