Preferred Language
Articles
/
bsj-3242
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location API to obtain locations result implemented in Google Maps. Track a smartphone with fixed identifiers mostly SSN (SIM (Subscriber Identity Module) Serial Number) and IMEI (International Mobile Equipment Identity) derived from an identifying string unique to the user's device. The result located place is Moderate correct according to the (GSM) and (UMTS) cellular networks which is used for obtaining location information.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Partnership between Secondary Schools and Community Agencies to Improve the Outcomes of Students with Intellectual Disabilities (Reality and Development)
...Show More Authors

Abstract

The current research aims to identify the level of partnership between school and community agencies to improve secondary school outcomes for students with intellectual disabilities and develop strategies that help enhance community partnerships between schools and agencies. The researcher used the qualitative research approach; he utilized the interviews as a tool for data collection. The sample of research included (12) participants: three female school leaders, three male-school leaders, three female-school supervisors, and three male-school supervisors in schools that have programs for students with intellectual disabilities in Riyadh. The results of the study showed that the level of partnership bet

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 02 2022
Journal Name
المجلة العراقية للمعلومات
Social Networking sites and their role in publishing Scientific knowledge
...Show More Authors

The current research aims to highlight the role of social networking sites in the dissemination of scientific knowledge and the importance of their use by researchers, and the researcher relied on the descriptive approach and the survey method. Among the data collection tools are the questionnaire and paper and electronic sources. Among the most important results that the research came out with: The number of the subscribers’ sites was (14) sites, and the most used social sites for receiving and Disseminating Scientific knowledge are: Facebook, Telegram, WhatsApp, Viber, Messenger and YouTube. All respondents receive tacit knowledge (Exchange of Messages and News) through social networking sites, and few of them do not receive explicit kn

... Show More
Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Useing the Hierarchical Cluster Analysis and Fuzzy Cluster Analysis Methods for Classification of Some Hospitals in Basra
...Show More Authors

In general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Apr 05 2017
Journal Name
Journal Of Agriculture And Veterinary Science
Tillage Appearance Device Test When Used Mold Board Plow Under Difference of a Variables Condition
...Show More Authors

Tillage appearance device is mechanical, electric-electronic design, getting Patent from the Central Organization for Standardization and Quality Control – Industrial Property Department - Ministry of Planning – The Republic of IRAQ under number Patent 3876 in 20 / 4 / 2014, calculates the number of clods per area by Tillage appearance device, This is done through the generation electrical impulses are sent to the controlled accurate calculates number clods required space and shows the result on the screen in order to see the tillage view per area. Three factor used in these experiment, first factor represents forward speed of tractor three levels (3.5, 4.5, and 5.5 km/h), second factor represent soil moisture content at two levels (14

... Show More
Publication Date
Mon Jan 15 2018
Journal Name
Pollution Research
STUDY THE EFFECT OF THE WAVES EMITTED FROM TOWERS COMMUNICATION IN SOME BIOLOGICAL STANDERDS FROM DIFFERENT REGIONS IN BAGHDAD
...Show More Authors

The mobile phone has become one of the most important in our days. The effects of waves from mobile base station may cause health effects on human. The aim of this work was to study the effect of radiofrequency (RF) emitted from mobile base station on the hemoglobin (Hb), packed cell (PCV), white blood cells (WBC) and liver enzymes activity including glutamic oxaloacetic transaminase (GOT), glutamic pyruvie transaminase (GPT) and Alkaline phosphatase (ALP). In this study the people divided into control group who living away from mobile base station and experimental group who living near to the mobile base station. The present result found there is no significant differences (P<0.05) in the Hb and PCV, but there was a significant increases (

... Show More
Publication Date
Thu Nov 03 2022
Journal Name
Frontiers In Applied Mathematics And Statistics
Prey fear of a specialist predator in a tri-trophic food web can eliminate the superpredator
...Show More Authors

We propose an intraguild predation ecological system consisting of a tri-trophic food web with a fear response for the basal prey and a Lotka–Volterra functional response for predation by both a specialist predator (intraguild prey) and a generalist predator (intraguild predator), which we call the superpredator. We prove the positivity, existence, uniqueness, and boundedness of solutions, determine all equilibrium points, prove global stability, determine local bifurcations, and illustrate our results with numerical simulations. An unexpected outcome of the prey's fear of its specialist predator is the potential eradication of the superpredator.

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Torsional Resistance of Reinforced Concrete Girders with Web Openings
...Show More Authors
In this study, a three dimensional finite element analysis was utilized to study the behavior of reinforced concrete T-
girders with and without web openings under pure torsion by using
ANSYS
APDL
... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Proposing an Analysis System to Monitoring Weightlifting Based on Training (Snatch and Clean and Jerk)
...Show More Authors

Analysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
RMSRS: Rover Multi-purpose Surveillance Robotic System
...Show More Authors

The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref