Preferred Language
Articles
/
gReFvY0BVTCNdQwCgBr7
Survey on 3D Content Encryption
...Show More Authors

<p class="0abstract">The rapidly growing 3D content exchange over the internet makes securing 3D content became a very important issue. The solution for this issue is to encrypting data of 3D content, which included two main parts texture map and 3D models. The standard encryption methods such as AES and DES are not a suitable solution for 3D applications due to the structure of 3D content, which must maintain dimensionality and spatial stability. So, these problems are overcome by using chaotic maps in cryptography, which provide confusion and diffusion by providing uncorrelated numbers and randomness. Various works have been applied in the field of 3D content-encryption based on the chaotic system. This survey will attempt to review the approaches and aspects of the structure used for 3D content encryption methods for different papers. It found the methods that used chaotic maps with large keyspace are more robust to various attacks than other methods that used encryption schemes without chaotic maps. The methods that encrypting texture, polygon, and vertices for 3D content provide full protection than another method that provides partial protection.</p>

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 21 2021
Journal Name
The 3rd Al-noor International Conference Of Science And Technology 2021 Muscat-oman
Gama Platform Survey for Agent-Based Modelling
...Show More Authors

The agent-based modeling is currently utilized extensively to analyze complex systems. It supported such growth, because it was able to convey distinct levels of interaction in a complex detailed environment. Meanwhile, agent-based models incline to be progressively complex. Thus, powerful modeling and simulation techniques are needed to address this rise in complexity. In recent years, a number of platforms for developing agent-based models have been developed. Actually, in most of the agents, often discrete representation of the environment, and one level of interaction are presented, where two or three are regarded hardly in various agent-based models. The key issue is that modellers work in these areas is not assisted by simulation plat

... Show More
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
6G Wireless Communications Networks: A Comprehensive Survey
...Show More Authors

View Publication
Scopus (401)
Crossref (391)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Computer Applications
Content-based Image Retrieval (CBIR) using Hybrid Technique
...Show More Authors

Image retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud

... Show More
View Publication
Publication Date
Sat Oct 11 2025
Journal Name
Al–bahith Al–a'alami
Convincing methods in designing infographic content analytical study
...Show More Authors

The research aims to reveal the recent trends used in providing information and to know the persuasive methods used in designing the content of the infographic as well as the nature of persuasive design methods and the topics presented by the infographic in the research sample.   The researcher used the survey method, specifically the survey, by using the content analysis method to analyze the infographic material from the sample selected from the press and news sites that are the subject of the research, based on the method of what was said? How was it said? The researcher relied on the intentional sample, and this sample depends on the researcher selecting the vocabulary of the sample based on experiences and evaluating the c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Content Based Image Retrieval (CBIR) by Statistical Methods
...Show More Authors

            An image retrieval system is a computer system for browsing, looking and recovering pictures from a huge database of advanced pictures. The objective of Content-Based Image Retrieval (CBIR) methods is essentially to extract, from large (image) databases, a specified number of images similar in visual and semantic content to a so-called query image. The researchers were developing a new mechanism to retrieval systems which is mainly based on two procedures. The first procedure relies on extract the statistical feature of both original, traditional image by using the histogram and statistical characteristics (mean, standard deviation). The second procedure relies on the T-

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effect of differentiation strategy on achieve competitive advantage: survey comparison between the companies maintenance service
...Show More Authors

Is to obtain competitive advantage legitimate objective pursued by all organizations to achieve, because they live today in environments of rapid change and dynamic in order to meet the demands of the customer changing as well as intense competition between the organizations, which requires them to get the location of competitive markets in order to do this will remain to do the building and strengthening competitive advantage to be able to achieve, but that this feature is not easy and is not only through the identification and use of a successful strategy for a competitive standard and then manage it successfully. Hence the research problem of determining the sources of differentiation strategy and its impact on the dimensions of compe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2001
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY ON THE PREVALENCE OF INTESTINAL PARASITES AMONG ORPHAN CHILDREN INHABIT TWO STATEHOMES IN BAGHDAD CITY
...Show More Authors

230 stool samples were collected from 2 state homes for (males and females) to investigate
the infection of different intestinal parasites (pathogenic and non-pathogenic).
The infection rate was higher among males 15.7% than females 6%, these rates were
increased when concentration method was employed up to 54.8% for males and 8.7% for
females significantly.
Most infected orphans were found to harbor single parasite followed by double, triple
parasites.
The highest rate of infection was found among young age group (1-5) years old, while
the older age groups got lowest rates.
Of helminthes, the commonest parasite was Hymenolepis nana 5.7% and of protozoa, the
commonest intestinal parasite was Giardia lamblia

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 31 2025
Journal Name
Passer Journal Of Basic And Applied Sciences
Enhanced Security Taxonomy for Fog-Enabled VANETs: A Comprehensive Survey on Attacks, Challenges, Applications and Architectures
...Show More Authors

Vehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that c

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
An Optimised Method for Fetching and Transforming Survey Data based on SQL and R Programming Language
...Show More Authors

The development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Workplace Respect on Employee Performance: A Survey Study in Abu Ghraib Dairy Factory
...Show More Authors

This paper aims to explain the effect of workplace respect on employee performance at Abu Ghraib Dairy Factory (AGDF). For achieving the research aim, the analytical and descriptive approach was chosen using a questionnaire tool for collecting data.  It covers 22 items; ten of them for the workplace respect variable and twelve items for the employee performance variable. The research population involved human resources who work at AGDF in Baghdad within two administrative levels (top and middle). We conducted a purposive stratified sample approach. It was distributed 70 questionnaire forms, and 65 forms were received. However, six of them had missing data and did not include in the final data analysis. The main results are t

... Show More
View Publication Preview PDF