Preferred Language
Articles
/
xRiAJ5gBVTCNdQwC3bn6
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic similarity scores that ranged from 0.85 to 0.98, the Cyber-Neutrosophic Model proved to have higher analysis accuracy. Additionally, it provided robust data security by utilizing Advance Encryption Standards (AES)-256 with Role-Based Access Control.

Scopus Crossref
View Publication
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
USING SENSITIVITY ANALYSIS IN DETERMINING THE OPTIMAL&EFFICIENT PRODUCTION PLANS IN GREENHOUSES IN ASSOCIATION OF AL-WATAN UNDER CONDITION OF RISK &UNCERTAINTY
...Show More Authors

 The objectives of this research are to determine and find out the reality of crops structure of greenhouses in association of Al-Watan  in order to stand on the optimal use of economic resources available for the purpose of reaching a crop structure optimization of the farm that achieves maximize profit and gross and net farm incomes , using the method of linear programming to choose the farm optimal plan with the highest net income , as well as identifying production plans farm efficient with (income - deviation) optimal (E-A) of the Association and derived, which takes into account the margin risk wich derived from each plan using the model( MOTAD), as a model of models of linear programming alternative programming m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Engineering And Applied Sciences
Design and Implementation of Electronic Infrastructure for Academic Establishment
...Show More Authors

View Publication
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Design and implementation monitoring robotic system based on you only look once model using deep learning technique
...Show More Authors

<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security &amp; Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Theoretical And Applied Information Technology
Factors affecting global virtual teams’ performance in software projects
...Show More Authors

Scopus (23)
Scopus
Publication Date
Sat Aug 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Evaluating Implementation of Electric Power Generation Projects in Iraq
...Show More Authors
Abstract<p>Iraq has witnessed development in many fields and the electricity production sector is one of the most important of these fields. This is attributed to the State’s philosophy in supporting this sector through the development of economic development projects to serve and raise the level of the Iraqi individual. Electricity production in Iraq is affected by many variables such as load growth, economic and financial conditions, planning, etc. All these led to a disparity in the production of electric power to cover the demand for energy. The paper deals with the electricity generation sector overview in Iraq, Analysis of the effects of variables on the implementation of power generatio</p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Diagnoses of Delay Causes in Construction Projects During Disaster
...Show More Authors

Purpose: The aim of this study was to gain insight into causes of time delays and cost overruns in a selection of thirty case projects in Iraq. Delay factors have been studied in many countries/contexts, but not much data exists from countries under the conditions characterizing Iraq during the last 10-15 years.Design/methodology/approach: A case study approach was adopted, with thirty construction projects selected from the Baghdad region, of different types and sizes. For the case of the study, the participants in the projects provided data about the projects through the data collection tool distributed through the questionnaire directed to them. Statistical data analysis was used to build statistical relationships between time and cost d

... Show More
View Publication
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Procurement Management of Power Plants Construction Projects in Iraq
...Show More Authors

The government of Iraq states that despite the massive amounts invested in the power generating sector, the country has been plagued by power outages for more than three decades; One of the most common sources of the problem and significant impact on the waste of public funds in contractual processes. The Ministry of Planning issued the sectorial
specialized standard bidding documents (SSBD) of Design, Supply, and Installation of the Electromechanical Works (DSIoEW), which is primarily designed to support the Ministry of Electricity (MoE) by developing economic projects to improve the contractual process that led to raisings Iraqi electricity generation field. The research evaluates the impact of
applying the SSBD-DSIoEW for

... Show More
View Publication Preview PDF
Crossref (1)
Crossref