Preferred Language
Articles
/
Zhci25EBVTCNdQwCkJuY
A real-time automated sorting of robotic vision system based on the interactive design approach
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Design requirements according to the formal integration in the design of interior spaces
...Show More Authors

The formal integration of the interior spaces in general and the commercial spaces of the watch shops in the large commercial centers in particular is the goal that the designers aim to reach in order for the interior space to become successful in terms of the design idea and its characteristics. Implementation mechanism. One of the reasons for achieving formal integration in the interior spaces of watch shops is the requirements of the design that must be available in these spaces to reach a state of formal integration between the interior and the exterior so that the space becomes fully integrated in all respects. Because of the aforementioned reasons for dealing with the research, through four chapters: The first chapter included the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 10 2017
Journal Name
Al-academy
The Composition of design according to norm renovation in the interior design space
...Show More Authors

The interior spaces represent a true reflection of the concepts and values ​​of humanity and requirements; were interested in current research ongoing changes that have occurred in those human values ​​and requirements over time, even pat each time warp its values ​​and its own requirements. Those changes, which receive Bdilalha the spaces linked by a renewal which guarantees the interior design of the spaces of sustainability and bio-coordinated. Launched search from an initial perception that those associated with the changes of the spaces through time that have not been subject to examination and supervision, they will constitute a continuing threat of losing the ties with the past under the pretext of modernization and mo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Wed Nov 01 2023
Journal Name
Solar Energy
Optimizing performance of water-cooled photovoltaic-thermal modules: A 3D numerical approach
...Show More Authors

To evaluate and improve the efficiency of photovoltaic solar modules connected with linear pipes for water supply, a three-dimensional numerical simulation is created and simulated via commercial software (Ansys-Fluent). The optimization utilizes the principles of the 1st and 2nd laws of thermodynamics by employing the Response Surface Method (RSM). Various design parameters, including the coolant inlet velocity, tube diameter, panel dimensions, and solar radiation intensity, are systematically varied to investigate their impacts on energetic and exergitic efficiencies and destroyed exergy. The relationship between the design parameters and the system responses is validated through the development of a predictive model. Both single and mult

... Show More
View Publication
Scopus (22)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Jun 11 2017
Journal Name
Al-academy
The reflection of diode technology light emitting (LED) on the modular design of external lighting
...Show More Authors

Search marked (the reflection of diode technology light emitting (LED) on the modular design of external lighting) is an analytical study of the units, external lighting for gardens and adopted in its work on the diode technology emitting light to reach the magnitude of the effect and the change happening where according to this technique was the problem of the research in which is (what emotion the formal and functional units of external lighting according diode technology light emitting) and identified in the first part of it, including the goals came Search of b (statement reversal winning technical transformation of lighting from incandescent bulbs to light emitting diode technology (LED) on each of shape design and the nature of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Applied Numerical Mathematics
Multiple time-dependent coefficient identification thermal problems with a free boundary
...Show More Authors

View Publication
Scopus (28)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Effect Of Technology Based Learning As A Supplement To Traditional Technology On Student's Achievement
...Show More Authors

This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (20)
Crossref