Preferred Language
Articles
/
oxehLZIBVTCNdQwCPac2
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Rooting non-violence in the Holy Quran And models of the Prophet application
...Show More Authors

The term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Performance Comparison of Different Advanced Control Schemes for Glucose Level Control under Disturbing Meal
...Show More Authors

Abstract

In this work, diabetic glucose concentration level control under disturbing meal has been controlled using two set of advanced controllers. The first set is sliding mode controllers (classical and integral) and the second set is represented by optimal LQR controllers (classical and Min-, ax). Due to their characteristic features of disturbance rejection, both integral sliding mode controller and LQR Minmax controller are dedicated here for comparison. The Bergman minimal mathematical model was used to represent the dynamic behavior of a diabetic patient’s blood glucose concentration to the insulin injection. Simulations based on Matlab/Simulink, were performed to verify the performance of each controll

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Magnetorheological Normally Close Directional Control Valve: Magnetorheological normally close directional control valve
...Show More Authors

This valve is intended for use in valves for steering movement, using the qualities of the Magneto-rheological (MR) fluid to regulate the fluid, direct contact without the utilization of moving parts like a spool, a connection between electric flux, and fluid power was made, The simulation was done to employ the" finite element method of magnetism (FEMM)" to arrive at the best design. This software is used for magnetic resonance valve finite element analysis. The valve's best performance was obtained by using a closed directional control valve in the normal state normally closed (NC) MR valve, with simulation results revealing the optimum magnetic flux density in the absence of a current and the shedding condition, as well as the optimum

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The effect of learning program in developing some social concepts for nursery kids about ( 4 – 5 ): The effect of learning program in developing some social concepts for nursery kids about ( 4 – 5 )
...Show More Authors

Abstact:
Nursery is one of educational institution in the process of developing the
social concepts that it includes a quirking the knowledge and experiences that
help the kid to adjust with environment through arrangement words ,
movements and concrete things which are transferred to the kids so as to
realize these concepts .
Social concepts are numbers of words and statements with social nature
which the kids learn through the family or nursery in order to effect their
educational style of independent and helping the others .
The re searcher adopted this theory because of the little studies in the
filed of social concepts in the nursery.
The aims of the study are as following :
1- building tools for

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Impact of Strategy 3-2-1 in acquiring Concepts of Sociology of fourth grade students: The Impact of Strategy 3-2-1 in acquiring Concepts of Sociology of fourth grade students
...Show More Authors

 

Abstract

The current research aims to identify the impact of triangular bridging strategy in the acquisition of sociology of fourth-stage students. To achieve the research objective, the following null hypotheses were adopted: there are no statistically significant differences at a significance level (0, 05) between the average grades of the experimental group students who studied the triangular bridging strategy in acquiring concepts of sociology and average grades of the control group. The researcher has selected the fourth-stage students from Alexandronah School for girls that s related to the Directorate General of Baghdad the sample consisted of (87) students at litera

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 15 2025
Journal Name
Smart Innovation, Systems And Technologies
The Role of the European Economic Security Strategy in Managing Economic Risks
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The strategy of preventive war In US National Security Documents (2002-2006)
...Show More Authors

The adoption of the concept of preventive war in any country especially in a country like the United States result in a lot of serious consequences, so that pre-emptive military action may alter certain regional arrangements based on the basis of political and security balance, and reduce the incidence of tensions that may worsen a sudden during the application of preventive war, so the concept is applicable to be a risk much more when you face the reality and that because the issues more importantly, it should prepare a detailed and careful study of the post –stage of the use of preventive military action and this requires realy no papers insist or documents discuss this but accurate this field study of the situation thereafter.

View Publication Preview PDF
Crossref