Preferred Language
Articles
/
bsj-3862
Real-Time Cloth Simulation on Virtual Human Character Using Enhanced Position Based Dynamic Framework Technique
...Show More Authors

     Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications.   This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision with moving capsules is implemented to achieve realistic behavior cloth modelled on animated characters. This is to enable comparable incompressibility and convergence to raised cosine deformation (RCD) function solvers. On implementation, this research achieves optimized collision between clothes, syncing of the animation with the cloth simulation and setting the properties of the cloth to get the best results possible. Therefore, a real-time cloth simulation, with believable output, on animated VHC is achieved. This research perceives our proposed method can serve as a completion to the game assets clothing pipeline.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
دور بعض الأفعال المنظمية في إدارة الوقت دراسة مسحية في عينة من المكتبات الجامعية في بغداد
...Show More Authors

 The organizations recognize what the effective role of time management in achieving competitive advantage and success. But the effectiveness depends on integrating some organization actions which perspective are relating with it by significance relations and high affect. From this the research problem is arising، which descripe the recognizing of libraries managers for the role of some organizational actions. The samples from (40) libraries managers are chosen.

The major results: these organizational actions are related and affected on the time management  if integrated with  one anothers more than if related in separate.  &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Financial Guarantee Assessmeats on Accounting Profite: Apractical Research In Dell Company
...Show More Authors

The research specialized in examining the role of guarantees and their impact on accounting benefits quality using statistical analysis to the income before and after the impact of guarantee on the accounting profits.This research depended on the inductive approach, which ensures that companies could manipulate in benefits through a variety of means including the guarantees. As it is possible that the companies can use the policy of guarantee as a strategy in business deal. The research aimed to highlight the different companies' practices on policies guarantee and its impact on accounting benefits. The benefit of Dell Company has been chosen as a sample for the research because of the availability of interim data from the company for te

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 14 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effect of Electronic Games on Children Behaviors who Attending Teaching Hospitals in Baghdad City
...Show More Authors

Objective(s): current study aims to find the effect of electronic games on children's behavior, and find the
relationship between child demographic data and the effect of electronic games on the child's behavior.
Methodology: A descriptive-analytic study was conducted for assessing the Effect of electronic games on
children's behaviors that attending to teaching hospitals in Baghdad city during the period of (October/ 20th
/2017 to March/1st /2018). A (50) purposive (non- probabilistic) sample from: Child Protection teaching
Hospital, Child Central Hospital in AL-Iskan. The sample is selected according to the criteria: Children who
visited the consulting unit of children in the hospitals in the first visit, children in

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Effect of Solid Particle Properties on Heat Transfer and Pressure Drop in Packed Duct
...Show More Authors

This work examines numerically the effects of particle size, particle thermal conductivity and inlet velocity of forced convection heat transfer in uniformly heated packed duct. Four packing material (Aluminum, Alumina, Glass and Nylon) with range of thermal conductivity (from200 W/m.K for Aluminum to 0.23 W/m.K for Nylon), four particle diameters (1, 3, 5 and 7 cm), inlet velocity ( 0.07, 0.19 and 0.32 m/s) and constant heat flux ( 1000, 2000 and 3000 W/ m 2) were investigated. Results showed that heat transfer (average Nusselt number Nuav) increased with increasing packing conductivity; inlet velocity and heat flux, but decreased with increasing particle size.Also, Aluminum average Nusselt number is about (0.85,2.

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
the impact of knowledge management on organizational innovation in aviation companies operating in sudan
...Show More Authors

Abstract

The aim of this study was to identify the impact of the Knowledge Management Processes on organizational creativity in the Airlines  Companies working in Sudan. The hypotheses formulated as:, there is a positive relationship statistically significant differences between knowledge management processes (diagnosis, the acquisition, storage, distribution and application) and organizational creativity. the measurement of the variables had been adopted from previous studies. The study used a Descriptive approach and and the analytical statistical method to construct the model and SPSS Program for data analysis .Purposive sample procedure had been chosen and structured questionnaire had been developed. Out of 215 q

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Dissertation/thesis
A Model To Evaluate the Online Training for Global Virtual Teams in Global Software Projects
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
Low Fistula in Ano Treatment using Diode Laser 980nm
...Show More Authors

Anal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref