Preferred Language
Articles
/
jRZXJIwBVTCNdQwCG_gG
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
A Unit Plan Based Upon The MI Theory: A theoretical study with an application Inside The Classroom
...Show More Authors

This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Speech Enhancement Algorithm Based on a Hybrid Estimator
...Show More Authors
Abstract<p>Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra</p> ... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Determination of solar window for Baghdad city using pv system program
...Show More Authors

Been using a pv system program to determine the solar window for Baghdad city . the solar window for any location can be determine by deviating left and right from the geographical south as well as deviation according to the amount of tilt angle with the horizon for fixed panel so that will not change the average of solar radiation incident over the whole year and this lead to help in the process of installation of fixed solar panel without any effect on annual output .the range of solar window for Baghdad city between two angles ( -8 - +8 ) degrees left to right of the geographical south and tilt angle that allowed for the horizon range between angles (21- 30) degrees so that the amount of solar radiation that falling on the solar pan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat May 09 2015
Journal Name
International Journal Of Innovations In Scientific Engineering
USING ARTIFICIAL NEURAL NETWORK TECHNIQUE FOR THE ESTIMATION OF CD CONCENTRATION IN CONTAMINATED SOILS
...Show More Authors

The aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Study the random walking of the ISX60 market index For the Iraq Stock Exchange
...Show More Authors

This paper aimed to test random walking through the ISX60 market index for the ability to judge market efficiency at a weak level. The study used Serial Correlation Test, the Runs Test, the Variance Ratio Test, as well as the Rescaled Range Test.The population of the study represents of Iraq Stock Exchange. The study concluded accepting the hypothesis of the study that the returns of the ISX60 market index in the Iraqi market for securities does not follow the random walking in general and as a result the Iraq market for securities is inefficient within the weak level of efficiency and the study recommended need a supervisors work in the Iraqi market for securities to activate all means a which will work to communication with information

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Performance of Solar Adsorption Cooling System Using Methanol and Activated Carbon as a Working Pair
...Show More Authors

The need for renewable energy sources is higher than ever due to rising global warming, climate change, and ozone depletion. For refrigeration and air conditioning applications, adsorption refrigeration systems are viable alternatives cooling techniques. This study is a topic and part of the M.Sc. thesis. A field solar-powered ice maker unit was created, studied, tested, and evaluated on the 13th and 30th of May, 2022. Activated carbon and methanol pair was used to set up a refrigeration system in Baghdad (Al Dora). Experimental tests were carried out outdoors to determine the coefficient of performance COP and specific cooling power SCP of the system. The results showed that the lowest temperature

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref