Sharif Mohieddin Haider worked on composing of musical compositions for the Oud different from the traditional forms known as (Peşrev, Sama'i, Longa… etc.), but they are not clear in building their musical form. This study tackles this issue by revealing the structure of the building of the musical form of these Musical compositions.
The importance of this research lies in that it provides an academic scientific study on the important subject of Musical composition forms and the way of constructing them. It helps players and students in the study of Arab music, if they want to write according to their musical form.
This research dealt with two topics in its theoretical framewo
... Show MoreThe research addresses smart city concept as it is the latest urban design trends, by the investment of the capabilities of human, and artificial intelligence for the sake of the advancement of the city. The concept of a smart city is described as one of the most important manifestations of the information revolution, with the end of the twentieth, and the beginning of twenty – first century, The research attributes the emergence of the concept to: deficiencies of means, and traditional methods in building and development of cities, as well as The significant increase in the number of city and global metropolises dwellers. So, smart city approach has been adopted, along with innovative principles and methods which cons
... Show MoreThe research article deals with the process of building or rebuilding the state in Iraq after 2003 in its various dimensions, in light of the vision and foundational procedures that were developed and supervised by the United States in cooperation with the new leaders of Iraq based on the mechanism of sectarianethnic representation, and diagnosing the imbalances that arose out of that vision and the accompanying procedures, which led to the emergence of new variables in the political process, especially in the post-ISIS* phase, which produced important challenges to the political system and the Iraqi state. The political dynamics and balances emerging after ISIS* represented at the same time opportunities and risks in the process of
... Show MoreAbstract
The aim of the current research is to identify the level of administrative applications of expert systems in educational leadership departments in light of the systems approach. To achieve the objectives of the research, the descriptive-analytical and survey method was adopted. The results showed that the level of availability of the knowledge base for expert systems in educational leadership departments (as inputs) was low. The level of availability of resources and software for expert systems in educational leadership departments (as transformational processes) came to be low, as well as the level of availability of the user interface for expert systems in educational leadership departments (as outputs
... Show MoreAbstract
Robust controller design requires a proper definition of uncertainty bounds. These uncertainty bounds are commonly selected randomly and conservatively for certain stability, without regard for controller performance. This issue becomes critically important for multivariable systems with high nonlinearities, as in Active Magnetic Bearings (AMB) System. Flexibility and advanced learning abilities of intelligent techniques make them appealing for uncertainty estimation. The aim of this paper is to describe the development of robust H2/H∞ controller for AMB based on intelligent estimation of uncertainty bounds using Adaptive Neuro Fuzzy Inference System (ANFIS). Simulatio
... Show MoreClustering is an unsupervised learning method that classified data according to similarity probabilities. DBScan as a high-quality algorithm has been introduced for clustering spatial data due to its ability to remove noise (outlier) and constructing arbitrarily shapes. However, it has a problem in determining a suitable value of Eps parameter. This paper proposes a new clustering method, termed as DBScanBAT, that it optimizes DBScan algorithm by BAT algorithm. The proposed method automatically sets the DBScan parameters (Eps) and finds the optimal value for it. The results of the proposed DBScanBAT automatically generates near original number of clusters better than DBScanPSO and original DBScan. Furthermore, the proposed method
... Show MoreAn intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co
... Show MoreThis paper represents an experimental study on the application of smart control represented by the use of the fuzzy logic controller. Two-link flexible manipulators that are used in airspace and military applications are made of flexible materials characterized by low frequency and damping ratio. To solve this problem, this paper proposes the use of smart materials (piezoelectric transducers), where each link is bonded with a pair of piezoelectric transducers that act as a sensor and another as an actuator. As the arm vibrates because of the movement generated by the motor, this voltage is controlled by a regulator inside the LABVIEW® 2020 software and sends the output control voltage to the piezoelectric actuator. Experimental results
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show More