Preferred Language
Articles
/
jcoeduw-1307
The Effectiveness of Teaching Program Based on The Theory of Multiple Intelligence in the Development of Literary Thinking Among Students

The research aims to know the effectiveness of a training program based on multiple intelligence theory in developing literary thinking among students of the Arabic Language Department at Ibn Rushd School of Humanities and to achieve the goal of research, the Safaris Research Institute, and the research community of Arabic language students in the Faculty of Education the third section of Arabic Language: The research sample consists of (71) students. Divided into (35) students in the experimental group and (36) students in the control group, the researcher balanced between the two groups with variables (intelligence, testing of tribal literary thinking, and time age in months), and after using the T-test for two independent samples, the results show the superiority of the students of the experimental group who studied according to the training program, and suggested a number of recommendations have been given.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Scopus Crossref
View Publication
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Spam Filtering based on Naïve Bayesian with Information Gain and Ant Colony System

This research introduces a proposed hybrid Spam Filtering System (SFS) which consists of Ant Colony System (ACS), information gain (IG) and Naïve Bayesian (NB). The aim of the proposed hybrid spam filtering is to classify the e-mails with high accuracy. The hybrid spam filtering consists of three consequence stages. In the first stage, the information gain (IG) for each attributes (i.e. weight for each feature) is computed. Then, the Ant Colony System algorithm selects the best features that the most intrinsic correlated attributes in classification. Finally, the third stage is dedicated to classify the e-mail using Naïve Bayesian (NB) algorithm. The experiment is conducted on spambase dataset. The result shows that the accuracy of NB

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
Low-Rate High-Quality Parametric Audio Coder based on Sinusoidal plus Noise Representations

This paper presents a parametric audio compression scheme intended for scalable audio coding applications, and is particularly well suited for operation at low rates, in the vicinity of 5 to 32 Kbps. The model consists of two complementary components: Sines plus Noise (SN). The principal component of the system is an. overlap-add analysis-by-synthesis sinusoidal model based on conjugate matching pursuits. Perceptual information about human hearing is explicitly included into the model by psychoacoustically weighting the pursuit metric. Once analyzed, SN parameters are efficiently quantized and coded. Our informal listening tests demonstrated that our coder gave competitive performance to the-state-of-the- art HelixTM Producer Plus 9 from

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Sensing And Bio-sensing Research
Scopus (32)
Crossref (26)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
Ultrasound Images Registration Based on Optimal Feature Descriptor Using Speeded Up Robust Feature

Image registration plays a significant role in the medical image processing field. This paper proposes a development on the accuracy and performance of the Speeded-Up Robust Surf (SURF) algorithm to create Extended Field of View (EFoV) Ultrasound (US) images through applying different matching measures. These measures include Euclidean distance, cityblock distance, variation, and correlation in the matching stage that was built in the SURF algorithm. The US image registration (fusion) was implemented depending on the control points obtained from the used matching measures. The matched points with higher frequency algorithm were proposed in this work to perform and enhance the EFoV for the US images, since the maximum accurate matching po

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
Scopus (7)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
Scopus (5)
Crossref (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
Crossref (2)
Crossref
View Publication