Preferred Language
Articles
/
WxiLhZgBVTCNdQwCv77a
Towards Space Sensor Network and Internet of Things: Merging CubeSats with IoT
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Jun 14 2022
Journal Name
Al-academy
Space Efficiency in the Arabic Calligraphy panel
...Show More Authors

 Most of the propositions, after the Arabic letter reached a position of integrity and proficiency, the calligrapher turned to the production of calligraphic formations in various aesthetic and expressive forms, investing the spiritual energies in what these calligraphic compositions show in artistic paintings. It carries a lot of meanings that are embodied in linear formations, and in order to reach these expressions and know the effective positions of space, this research is concerned with studying these technical treatments. The first chapter included the research problem, which included a question about the effectiveness of space in the linear painting, the importance of research and the temporal and spatial boundaries. As for the s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Sat Jan 01 2022
Journal Name
International Middle Eastern Simulation And Modelling Conference 2022, Mesm 2022,
MECHANICS OF COMPOSITE PLATE STRUCTURE REINFORCED WITH HYBRID NANO MATERIALS USING ARTIFICIAL NEURAL NETWORK
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Jun 16 2019
Journal Name
Al–bahith Al–a'alami
Academic Trends of Paper Press in Comparison with Internet Press A Field Study on Professors o College of Media at University of Baghdad
...Show More Authors

This search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continued development and widespread deployment of web journalism. This research belongs to descriptive studies which depends on sample survey approach adopted by five-meter design measuring trends. It contains 28 items having applied honesty and reliability transaction and the scale form is distributed to the sample studied of about 110 professors and then the researcher collects them and then applying the appropriate statistical program to get the results. This search seeks to know the trends of academics in the field of Press and audio, video and read press about paper press compared with continu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Social and Psychological Abuse towards Elderly People Living in Elderly Home: Social and Psychological Abuse towards Elderly People Living in Elderly Home
...Show More Authors

Abstract

This study aims to identify the social and psychological abuse towards elderly people by others, to identify the difference of social and psychological abuse towards elderly by others according to the variable of gender (male and female). Additionally, to identify the difference of social and psychological abuse towards elderly by determining the one who is responsible of abusing (son, daughter, spouse, etc.). To achieve this aim, the researcher designed a scale to identify the social and psychological abuse towards elderly by others. The results showed that this sample exposed to psychological abuse by different sides due to lacking of powers. Besides, the result showed that there are no signifi

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Preparation and characterization of mixed SnO2:CdO thin films as gas sensor
...Show More Authors

In this study, tin oxide (SnO2) and mixed with cadmium oxide (CdO) with concentration ratio of (5, 10, 15, 20)% films were deposited by spray pyrolysis technique onto glass substrates at 300ºC temperature. The structure of the SnO2:CdO mixed films have polycrystalline structure with (110) and (101) preferential orientations. Atomic force microscopy (AFM) show the films are displayed granular structure. It was found that the grain size increases with increasing of mixed concentration ratio. The transmittance in visible and NIR region was estimated for SnO2:CdO mixed films. Direct optical band gap was estimated for SnO2 and SnO2 mixed CdO and show a decrease in the energy gap with increasing mixing ratio. From Hall measurement, it was fou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
Globalization impact on interior space identity of cafes Baghdadi
...Show More Authors

Appeared in the light of globalization growing convergence of the distances between the countries in world, this convergence is causing mixing of cultures to become culture is a universal one culture, There are positives and negatives of this mixing and mingling of cultures, consider Loss of cultural identity is one of the biggest negatives the Arab cultural infrastructure in general and Iraq in special. In addition consider subject to not keep the cultural identity is the most important Arab issues and dangerous to our Arab identity in various fields, including design and architecture, highlights here the subject of research on the impact of globalization on the identity of the interior spaces, cafés of Baghdadi, one of the historical

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
Comparison of the Combining Methods Used In Space Diversity
...Show More Authors

The basic concept of diversity; where two or more inputs at the receiver are used to get uncorrelated signals. The aim of this paper is an attempt to compare some possible combinations of diversity reception and MLSE detection techniques. Various diversity combining techniques can be distinguished: Equal Gain Combining (EGC), Maximal Ratio Combining (MRC), Selection Combining and Selection Switching Combining (SS).The simulation results shows that the MRC give better performance than the other types of combining (about 1 dB compare with EGC and 2.5~3 dB compare with selection and selection switching combining).

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref