Through research it shows that the calculation has an effective role in the maintenance of Islamic law and save. And that the calculation religious function to attach religious matters and it closeness to God, whether calculated or assumed carried out by volunteers. And scientists from the description of the calculation as a social function to attach to morality and kinship and charity to the poor and the dissemination of science. By definition it shows that the injury will not be exposed only to the evils of any phenomenon that do not break and was checking to search for evil, but he must intervene if he saw visible in front of him. And that of the areas that could see the calculation are the field of information and educ
... Show MoreIn this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.
Among the different passive techniques heat pipe heat exchanger (HPHE) seems to be the most effective one for energy saving in heating ventilation and air conditioning system (HVAC). The applications for nanofluids with high conductivity are favorable to increase the thermal performance in HPHE. Even though the nanofluid has the higher heat conduction coefficient that dispels more heat theoretically but the higher concentration will make clustering .Clustering is a problem that must be solved before nanofluids can be considered for long-term practical uses. Results showed that the maximum value of relative power is 0.13 mW at nanofluid compared with other concentrations due to the low density of nanofluid at this concentration. For highe
... Show MoreThe use of a communication network in the closed loop control systems has many advantages such as remotely controlling equipment, low cost, easy to maintenance, efficient information transmission, etc. However, the Networked Control System (NCS) has many drawbacks, such as network-induce end-to-end time delay and packet loss, which lead to significant degradation in controller performance and may result in instability. Aiming at solving performance degradation in NCS, this paper propose to take the advantages and strength of the conventional Proportional-Integral-Derivative (PID), Fuzzy Logic (FL), and Gain Scheduling (GS) fundamentals to design a Fuzzy-PID like-Gain Scheduling (F-PID-GS) control technique, which has been proved to be ef
... Show MoreRecently personal recommender system has spread fast, because of its role in helping users to make their decision. Location-based recommender systems are one of these systems. These systems are working by sensing the location of the person and suggest the best services to him in his area. Unfortunately, these systems that depend on explicit user rating suffering from cold start and sparsity problems. The proposed system depends on the current user position to recommend a hotel to him, and on reviews analysis. The hybrid sentiment analyzer consists of supervised sentiment analyzer and the second stage is lexicon sentiment analyzer. This system has a contribute over the sentiment analyzer by extracting the aspects that users have been ment
... Show MoreIntelligent systems can be used to build systems that simulate human behavior. One such system is lip reading. Hence, lip reading is considered one of the hardest problems in image analysis, and thus machine learning is used to solve this problem, which achieves remarkable results, especially when using a deep neural network, in which it dives deeply into the texture of any input. Microlearning is the new trend in E-learning. It is based on small pieces of information to make the learning process easier and more productive. In this paper, a proposed system for multi-layer lip reading is presented. The proposed system is based on micro content (letters) to achieve the lip reading process using deep learning and auto-correction mo
... Show MoreThis work aimed to design, construct and operate a new laboratory scale water filtration system. This system was used to examine the efficiency of two ceramic filter discs as a medium for water filtration. These filters were made from two different ceramic mixtures of local red clay, sawdust, and water. The filtration system was designed with two rotating interfered modules of these filters. Rotating these modules generates shear force between water and the surfaces of filter discs of the filtration modules that works to reduce thickness of layer of rejected materials on the filters surfaces. Each module consists of seven filtration units and each unit consists of two ceramic filter discs. The average measured hy
... Show MoreThis paper designed a fault tolerance for soft real time distributed system (FTRTDS). This system is designed to be independently on specific mechanisms and facilities of the underlying real time distributed system. It is designed to be distributed on all the computers in the distributed system and controlled by a central unit.
Besides gathering information about a target program spontaneously, it provides information about the target operating system and the target hardware in order to diagnose the fault before occurring, so it can handle the situation before it comes on. And it provides a distributed system with the reactive capability of reconfiguring and reinitializing after the occurrence of a failure.
Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the
... Show Moreإن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة بين المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ
... Show More