Preferred Language
Articles
/
xRiAJ5gBVTCNdQwC3bn6
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic similarity scores that ranged from 0.85 to 0.98, the Cyber-Neutrosophic Model proved to have higher analysis accuracy. Additionally, it provided robust data security by utilizing Advance Encryption Standards (AES)-256 with Role-Based Access Control.

Scopus Crossref
View Publication
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design, Synthesis and Preliminary Antimicrobial Evaluation of New Derivatives of Cephalexin
...Show More Authors

There is a continuous and massive need for newer cephalosporins that should have resistance against β-lactamases and can be used orally. An approach of using cephalexin, as a well-studied and potent antibacterial compound is considered to prepare new designed derivatives.  These derivatives include the incorporation of amino acid moiety linked through an amide bond with the α-amino group of cephalexin. Certain aliphatic amino acids were used, such as glycine, alanine, valine and proline. The chemical structures of these derivatives were confirmed by IR spectroscopy and elemental analyses. All the synthesized compounds were subjected for preliminary evaluation of antimicrobial activity using well diffusion method, against certa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Star model –model of organization design and reflections of its variables and dimensions of health performance on-filed study in medical city hospital
...Show More Authors

Abstract

      The goal of current research to describe and diagnose the level of attention of doctors to design and regulatory dimensions, (strategic vision, organizational structure, organizational processes, business systems, personnel), and the performance of hospitals and dimensions, in six hospitals in medicine and selected a sample for research, as well as identify organizational design effect in the performance of hospitals and dimensions (efficiency, the development of human resources, patient satisfaction, achieve financial results, quality of health care).

 Research has focused in part theoretical on key variables to look organizational des

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
Critical Success Factors in Construction Projects (Governmental Projects as a Case Study)
...Show More Authors

The importance of the construction sector and its Great role in the provision of services and infrastructure, reduce poverty, improve living conditions and improve the economic situation in the country, impose attention to the way in which the projects implemented for its improvement and to get successful projects. The objective of this research was to determine the criteria for success as well as critical success and failure factors that have a significant impact on project success. A selected 75 engineer (department managers, project managers and engineers) are asked to fill  the questionnaire form, Sixty-seven valid questionnaire forms were analyzed statistically to get search results, which were as follows : Twe

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 31 2024
Journal Name
Intelligent Automation And Soft Computing
Fusion of Type-2 Neutrosophic Similarity Measure in Signatures Verification Systems: A New Forensic Document Analysis Paradigm
...Show More Authors

Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also unable to adjust to various

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Telecommunication, Electronic And Computer Engineering
The critical success factors (CSFs) for IT projects
...Show More Authors

Huge yearly investments were made by organizations for the development and maintenance. However, it has been reported that most of the IT projects fails as it is delayed, over budget and discontinued quality. A systematic literature review (SLR) was conducted to identify the critical success factors (CSFs) for the IT projects. Nine (9) CSFs was identified from the SLR. An online survey was conducted among 103 respondents from developers and IT managers. The data was analyzed using the Statistical Package for Social Science (SPSS 22). The findings showed that the highest CSFs of IT projects is commitment and motivation. Project monitoring was found the lowest score ranked by respondents.

Scopus (18)
Scopus
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect of Continuous Improvement in Achieving Competitive Advantage for Iraqi Universities: And Their Research Projects
...Show More Authors

The rapid change in economic is a serious challenge facing all countries around the world, even developed ones. This challenge is increasing as the world enters the age of knowledge in which different knowledge and technologies have emerged and the distance between the emergence of scientific knowledge and its actual application on the ground has been reduced as well as the growing role of science and technology in community development. One of the most important technology amongst these technologies is nanotechnology, where this technology plays a major role in the development of products and modern devices and reduces cost with quality improvement. This technology is cross-cultural, requires a comprehensive knowledge structure and depe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 19 2020
Journal Name
International Journal Of Innovation, Creativity And Change
Secure Image Steganography Through Multilevel Security
...Show More Authors

The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref