Preferred Language
Articles
/
uRZjSIcBVTCNdQwC5EGR
Cascade position-torque control strategy based on function approximation technique (FAT) for flexible joint robots
...Show More Authors

Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
2017 11th Asian Control Conference (ascc)
ESO-based repetitive control for rejecting periodic and aperiodic disturbances in piezoelectric actuators
...Show More Authors

This paper presents the Extended State Observer (ESO) based repetitive control (RC) for piezoelectric actuator (PEA) based nano-positioning systems. The system stability is proved using Linear Matrix Inequalities (LMIs), which guarantees the asymptotic stability of the system. The ESObased RC used in this paper has the ability to eliminate periodic disturbances, aperiodic disturbances and model uncertainties. Moreover, ESO can be tuned using only two parameters and the model free approach of ESO-based RC, makes it an ideal solution to overcome the challenges of nano-positioning system control. Different types of periodic and aperiodic disturbances are used in simulation to demonstrate the effectiveness of the algorithm. The comparison studi

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Oct 22 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Classification of Different Shoulder Girdle Motions for Prosthesis Control Using a Time-Domain Feature Extraction Technique
...Show More Authors

Abstract—The upper limb amputation exerts a significant burden on the amputee, limiting their ability to perform everyday activities, and degrading their quality of life. Amputee patients’ quality of life can be improved if they have natural control over their prosthetic hands. Among the biological signals, most commonly used to predict upper limb motor intentions, surface electromyography (sEMG), and axial acceleration sensor signals are essential components of shoulder-level upper limb prosthetic hand control systems. In this work, a pattern recognition system is proposed to create a plan for categorizing high-level upper limb prostheses in seven various types of shoulder girdle motions. Thus, combining seven feature groups, w

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Study to modify the fat cow's milk for children and infants
...Show More Authors

This study Ajert to modify the chemical composition of milk fat cows and make it similar to the installation of milk fat mother through the addition of protein and soybean oil to be given Alkhltatnsp sensory protein that the best plan is the ratio of 1:1

View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Radioelectronics And Communications Systems
Optical CDMA Coded STBC Based on Chaotic Technique in FSO Communication Systems
...Show More Authors

Free-Space Optical (FSO) can provide high-speed communications when the effect of turbulence is not serious. However, Space-Time-Block-Code (STBC) is a good candidate to mitigate this seriousness. This paper proposes a hybrid of an Optical Code Division Multiple Access (OCDMA) and STBC in FSO communication for last mile solutions, where access to remote areas is complicated. The main weakness effecting a FSO link is the atmospheric turbulence. The feasibility of employing STBC in OCDMA is to mitigate these effects. The current work evaluates the Bit-Error-Rate (BER) performance of OCDMA operating under the scintillation effect, where this effect can be described by the gamma-gamma model. The most obvious finding to emerge from the analysis

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
مجلة نسق
Islamic Sharia’s position on the phenomenon of bullying
...Show More Authors

The study was enriched by examining (Islamic Sharia’s position on the phenomenon of bullying) becausee bullying is a recurring aggressive behavior that Is one of the types of violence directed by a person or group of prsons; With the intent of deliberately harming and offending anotherr person or group of persons, It has several verbal, physical, electronIc or other formsforms Bullies may follow a policy of Ientimidation or intimidation, as well as ridicule; In order to belittle the victim .The study aims to know the Islamic Sharia ruling on bullying as a modern term for a content that Is as old as man, and the study reached several results, Including: Islam’s affirmation of the prohibition of this phenomenon In word, deed and gesture,

... Show More
Preview PDF
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Statistical Approximation Operators
...Show More Authors

   In this paper we obtain some statistical approximation results for a general class of maxproduct operators including the paused linear positive operators.

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Survey theopinions professional and academics on building the strategy of internal audit function and the possibility of keeping abreast of developments
...Show More Authors

The research problem is clearly deficient suffered by the internal audit function in all institutions of Iraq, as a result of the lack of sponsor organizations for this profession and there is no law or local legislation determine its powers and its responsibilities and scope of work As well as the lack of interest of senior management in economic units that function, as it focuses its work on the scope of financial and accounting matters only So required to rebuild this function in line with the current developments as well as the lack of a framework that defines the strategy of this function, and it came the idea of research to find out how to create a regulatory method for re-strategic construction of the internal audit function depen

... Show More
View Publication
Crossref (1)
Crossref