Preferred Language
Articles
/
cRfQNY8BVTCNdQwCtmIm
VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism admin June 29, 2019
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Functional Engagement and Its Relationship to Hope-Based Thinking for Kindergarten Teachers
...Show More Authors

The research aims to identify the level of functional engagement and hope-based thinking of kindergarten teachers, identify if there is a significant difference in functional engagement and hope-based thinking in terms of specialization and years of service for kindergarten teachers, identify if there is a significant correlation between functional engagement and hope-based thinking of kindergarten teachers. The current research is determined by kindergarten teachers in the Second Rusafa Baghdad Education Directorate for the academic year (2022-2023). In order to achieve the objectives of the research, the researcher prepared a functional engagement scale, which consists of (45) items in three areas: Perceptual and functional engagement

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud
...Show More Authors

    Before users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Chained fuzzy modules
...Show More Authors

        Let R be a commutative ring with unity. In this paper we introduce the notion of chained fuzzy modules as a generalization of chained modules. We investigate several characterizations and properties of this concept

View Publication Preview PDF
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Semimaximal Submodules
...Show More Authors

     Let R be a commutative ring with unity and an R-submodule N is called semimaximal if and only if

 the sufficient conditions of F-submodules to be semimaximal .Also the concepts of (simple , semisimple) F- submodules and quotient F- modules are  introduced and given some  properties .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Distributive Modules
...Show More Authors

  Let R be a commutative ring with unity. In this paper we introduce and study fuzzy distributive modules and fuzzy arithmetical rings as generalizations of (ordinary) distributive modules and arithmetical ring. We give some basic properties about these concepts.  

View Publication Preview PDF
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fuzzy Semimaximal ideals
...Show More Authors

    Let R be a commutative ring with identity. A proper ideal I of R is called semimaximal if I is a finite intersection of maximal ideals of R. In this paper we fuzzify this concept to fuzzy ideals of R, where a fuzzy ideal A of R is called semimaximal if A is a finite intersection of fuzzy maximal ideals. Various basic properties are given. Moreover some examples are given to illustrate this concept.

View Publication Preview PDF