Preferred Language
Articles
/
alkej-6
Design And Implementation of Microcontroller Based Curing Light Control of Dental System.
...Show More Authors

In this paper, a microcontroller-based electronic circuit have been designed and implemented for dental curing system using 8-bit MCS-51 microcontroller. Also a new control card is designed while considering advantages of microcontroller systems the time of curing was controlled automatically by preset values which were input from a push-button switch. An ignition based on PWM technique was used to reduce the high starting current needed for the halogen lamp. This paper and through the test result will show a good performance of the proposed system.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Prepare a plan for the Total Productive Maintenance in the light of the concurrent engineering A Field Study in AL-Askandria General Company Machanical Industries and AL-Musaib Electric Power Station
...Show More Authors

           Strives Total Productive Maintenance  to increase the overall effectiveness of the equipment through the early involvement in the design and manufacture of equipment productivity. It also operates in an environment of simultaneous engineering work on the synchronization of activities to take advantage of early information by maintenance engineers, design, operation, and that helps to reduce the faults and facilitate future maintenance tasks.

    Has adopted a search in the theoretical concept of the total maintenance productivity and concurrent engineering activities carried out during which the conjunction a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 24 2022
Journal Name
Journal Of The College Of Languages (jcl)
The role of presupposition in the interpretation of the Qur'anic letters (Sharif Morteza, Mullah Sadra and Gonabadi): بررسی تأثیر پیش فهم‌ها بر فهم مفسران از حروف مقطعه در قرآن (شریف مرتضی، ملاصدرا و گنابادی)
...Show More Authors

The mysterious letters, the philosophy of existence and the meaning of these letters in the Qur'an is one of the mysterious issues that has always occupied the minds of Interpreters. Each Interpreter has tried to provide his own interpretation and understanding of these mysterious letters. Since these letters are part of the surah of the Qur'an and at the same time, the appearance of these letters, unlike other verses, does not indicate meaning, the commentators have approached these verses with their preconceptions. In this article, an attempt has been made to investigate the role of pre-interpreters of descriptors in a descriptive and analytical method in finding the meaning of syllables. However, each of them has tried to interpret th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Role of Gender and Culture in Dealing with the Arab Woman's Issues Embodied in Caricatures: A Cognitive Linguistic Analysis
...Show More Authors

Gender and culture are among the factors that influence the process of understanding and interpreting different types of communication, especially images. The current study, which is a part of a master’s thesis, aims at investigating the role of gender and culture in interpreting and understanding the caricatures that deal with women’s issues in Arab societies. To this end, the researchers adopted Barthes’ (1957) concepts of denotation and connotation in his theory of mythologies in addition to Langacker’s (1987) theory of (Domains). The research concludes that the female subjects have better cognitive abilities in investing the signs within the selected caricatures. The other factor the study reached to is that the respondents

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Physiology, Nutrition And Physical Education
The effect of effort perception training according to race speed rhythm control for developing speed endurance, adapting maximum heart rate, and achieving 3000 m running/hurdles for men
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
The Academic Assistance and its Relationship with the College and Stage Variables at the Department of Kindergarten’s Students: نبأ مجيد مطشر, و جميلة رحيم عبد
...Show More Authors

The study aims at knowing students’ academic assistance at the Department of Kindergarten. It further aims to know the difference of academic assistance among these students with respects to variables like (college of education for women, Baghdad, Thi-Qar). It also aims to know about the difference according to the academic level variable, in addition to its relation to some other variables. To achieve the objectives of the study, a number of university female students were selected from both Baghdad an Thi-Qar Universities in the academic year 2019-2020. The sample of the participants consisted of (400) students from the (second, third, and fourth) levels. To measure the study variable represented by the concept of academic assistance

... Show More
View Publication Preview PDF
Crossref