Preferred Language
Articles
/
vhbjGIoBVTCNdQwC4pAK
Towards computer vision feedback for enhanced CNC machining
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Fri Feb 28 2025
Journal Name
Journal Européen Des Systèmes Automatisés
Decision-Making Model for Aircraft Landing Based on Fuzzy Logic Approach
...Show More Authors

An aircraft's landing stage involves inherent hazards and problems associated with many factors, such as weather, runway conditions, pilot experiences, etc. The pilot is responsible for selecting the proper landing procedure based on information provided by the landing console operator (LCO). Given the likelihood of human decisions due to errors and biases, creating an intelligent system becomes important to predict accurate decisions. This paper proposes the fuzzy logic method, which intends to handle the uncertainty and ambiguity inherent in the landing phase, providing intelligent decision support to the pilot while reducing the workload of the LCO. The fuzzy system, built using the Mamdani approach in MATLAB software, considers critical

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Nov 04 2016
Journal Name
International Journal Of Renewable Energy Development
The Temperature Profile for The Innovative Design of the Perforated Fin
...Show More Authors

The development of the perforated fin had proposed in many studies to enhance the heat transfer from electronic pieces. This paper presents a novel derivative method to find the temperature distribution of the new design (inclined perforated) of the pin fin. Perforated with rectangular section and different angles of inclination was considered. Signum Function is used for modeling the variable heat transfer area. Set of parameters to handle the conduction and convection area were calculated. Degenerate Hypergeometric Equation (DHE) was used for modeling the Complex energy differential equation and then solved by Kummer’s series. In the validation process, Ansys 16.0-Steady State Thermal was used. Two geometric models were consider

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Directed by Treatment for single-place events in the cinematographic medium
...Show More Authors

The cinematographer mediates through the means of cinema and television a set of elements complementing each other in the light of developments in various sciences, culture and arts for the purpose of conveying the meaning to the recipient and achieve aesthetic taste. Despite the diversity of cinematographic media with its multiple forms, The researcher started from the principle of definition and knowledge of a technical phenomenon that emerged in the cinematographic medium through the treatment of dramatic events through the solutions of the exit line depends on the narrative of events in one place contributes to attract Mam spectator since this interesting phenomenon in the mediator, there .van question arises the adoption of that vis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Evaluation of FEMM software for magnetic analysis of the magnetorheological application
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2011
Journal Name
3rd European Workshop On Visual Information Processing
Mean Predictive Block Matching (MPBM) for fast block-matching motion estimation
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Bacteriological and Cytological study For bronchial washes from lung cancer patients
...Show More Authors

The study included the collection of 75 bronchial wash samples from patients suspected to have lung cancer. These samples were subjected to a diagnostic cytological study to detect the dominant type of lung cancer. It was noticed that 33 patients proved to have a lung cancer out of 75 (44%) of these, 19 cases (57.6%)were diagnosed having Squamus cell carcinoma,7cases (21.21%) showed Adenocarcinoma ,6 cases (18.18%) were having small cell carcinoma while only one case (3.03%)was large cell carcinoma .Nearly 70% of cases were correlated with smokers .Bacteria were isolated from 53 patients in which 33 isolates were associated with the cancer cases while 20 of them from non infected patients. By using different morphological ,biochemical test

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Data-Driven Approach for Teaching Arabic as a Foreign Language: Eygpt
...Show More Authors

Corpus linguistics is a methodology in studying language through corpus-based research. It differs from a traditional approach in studying a language (prescriptive approach) in its insistence on the systematic study of authentic examples of language in use (descriptive approach).A “corpus” is a large body of machine-readable structurally collected naturally occurring linguistic data, either written texts or a transcription of recorded speech, which can be used as a starting-point of linguistic description or as a means of verifying hypotheses about a language.  In the past decade, interest has grown tremendously in the use of language corpora for language education. The ways in which corpora have been employed in language pedago

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF