Preferred Language
Articles
/
bsj-3605
RMSRS: Rover Multi-purpose Surveillance Robotic System
...Show More Authors

The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities to analyze, detect and track objects plus few other graphical functions. The components mentioned above built on top of the four-wheel vehicle system with high torque to provide mobility on rough terrain. This work is based on Raspberry Pi and can be controlled over Wi-Fi locally or publicly over the internet. The results show making a high potential, relatively low price robot with lots of features and functions that can perform multiple tasks simultaneously, all are crucial to surveillance and monitoring problems, controlled by a user from far distances and for a long time.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Towards building an educational system free of scientific corruption (Applied study in a sample of colleges of higher education in Iraq within the framework of the government program and the directions of the Supreme Council for Combating Corruption)
...Show More Authors

Nations are developed with education and knowledge that raise the status of society in its various segments, beyond that it leads to underdevelopment and deterioration in various sectors, whether economic, health, social, etc. If we considered the general name of The ministry of Education & Scientific Studies, then the second part seems to be not functioning, since scientific research has no material allocation and remains based on the material potential of the university professor. As for the first half of the topic, the reality of the situation reveals problems related to the Holy Trinity of Education which is (Professor - Student - the scientific method) where universities suffer at the present time from this problem, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
The Determination of Critical-Sampling Scheme of Preprocessing for Multiwavelets Decomposition as 1st and 2nd Orders of Approximations.
...Show More Authors

One of the important differences between multiwavelets and scalar wavelets is that each channel in the filter bank has a vector-valued input and a vector-valued output. A scalar-valued input signal must somehow be converted into a suitable vector-valued signal. This conversion is called preprocessing. Preprocessing is a mapping process which is done by a prefilter. A postfilter just does the opposite.

The most obvious way to get two input rows from a given signal is to repeat the signal. Two rows go into the multifilter bank. This procedure is called “Repeated Row” which introduces oversampling of the data by a factor of 2.

 For data compression, where one is trying to find compact transform representations for a

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
The Existence of a Polynomial Inverse Integrating Factors and Studies About the Limit Cycles for Cubic, Quartic and Quintic Polynomial Systems
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2023
Journal Name
Periodicals Of Engineering And Natural Sciences
Solving the multi-criteria: total completion time, total late work, and maximum earliness problem
...Show More Authors

Within this research, The problem of scheduling jobs on a single machine is the subject of study to minimize the multi-criteria and multi-objective functions. The first problem, minimizing the multi-criteria, which include Total Completion Time, Total Late Work, and Maximum Earliness Time (∑𝐶𝑗, ∑𝑉𝑗, 𝐸𝑚𝑎𝑥), and the second problem, minimizing the multi-objective functions ∑𝐶𝑗 + ∑𝑉𝑗 +𝐸𝑚𝑎𝑥 are the problems at hand in this paper. In this study, a mathematical model is created to address the research problems, and some rules provide efficient (optimal) solutions to these problems. It has also been proven that each optimal solution for ∑𝐶𝑗 + ∑𝑉𝑗 + 𝐸𝑚𝑎𝑥 is an effic

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
3D- ABAQUS Modelling of Prestressed Concrete Hunched Beams with Multi-Openings of Different Shapes
...Show More Authors

A long-span Prestressed Concrete Hunched Beam with Multi-Opening has been developed as an alternative to steel structural elements. The commercial finite element package ABAQUS/CAE version 2019 has been utilized. This article has presented the results of three-dimensional numerical simulations investigating the flexural behaviour of existing experimental work of supported Prestressed Concrete Hunched Beams with multiple openings of varying shapes under static monotonic loads. Insertion openings in such a beam lead to concentrate stresses at the corners of these openings; as a result, extensive cracking would appear. Correlation between numerical models and empirical work has also been discussed regarding load displacemen

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 30 2020
Journal Name
Al-kindy College Medical Journal
Iraqi women Attitude towards Immediate Post-partum/ Post-abortion Contraception: a multi-institutional study
...Show More Authors

Background: Immediate postpartum contraceptive and post abortion contraception methods are effective safe methods and are becoming a standard practice in many countries, yet it is not widely used in Iraq.

Aims: this study: is designed to assess the attitude and willingness of women to immediate contraception after giving birth or abortion and their satisfaction to previous use.

Methods and Material: Four hundred thirty-four women were surveyed in the labor word immediately after giving birth/ abortion. Their knowledge, attitude and contraception use were assessed according to the response they reported to a given questionnaire.

Results: women were not sure abo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving the Multi-criteria, Total Completion Time, Total Earliness Time, and Maximum Tardiness Problem
...Show More Authors

Machine scheduling problems (MSP) are     considered as one of the most important classes of combinatorial optimization problems. In this paper, the problem of job scheduling on a single machine is studied to minimize the multiobjective and multiobjective objective function. This objective function is: total completion time, total lead time and maximum tardiness time, respectively, which are formulated as  are formulated. In this study, a mathematical model is created to solve the research problem. This problem can be divided into several sub-problems and simple algorithms have been found to find the solutions to these sub-problems and compare them with efficient solutions. For this problem, some rules that provide efficient solutio

... Show More
View Publication Preview PDF
Crossref