Preferred Language
Articles
/
xRiAJ5gBVTCNdQwC3bn6
Cyber Neutrosophic Model for Secure and Uncertainty Aware Evaluation in Indoor Design Projects
...Show More Authors

To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic similarity scores that ranged from 0.85 to 0.98, the Cyber-Neutrosophic Model proved to have higher analysis accuracy. Additionally, it provided robust data security by utilizing Advance Encryption Standards (AES)-256 with Role-Based Access Control.

Scopus Crossref
View Publication
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation for 3-DoF SCARA Robot based PLC
...Show More Authors

Abstract 

This paper presents mechanical and electrical design, and implementation  process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security & Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Measurement of indoor radon levels and assessment of radiological hazards at Al-Tuwaitha nuclear site and the surrounding area
...Show More Authors

In the present study the radon concentration was measured in indoor places by the RAD7 (radon detector) was in some locations at Al-Tuwaitha nuclear site and some surrounding areas for the duration from 13/10/2016 to 2/1/2017 and the measurement of the indoor radon concentration ranged from (4.96±4.4 to 102±25) Bq/m3. The high value of radon has been found at decommissioning directorate /emergency room, which is lower than the action value recommended by the Environmental Protection Agency (EPA) which is (148 Bq/m3) while the lowest value has been founded in central laboratories directorate \ models room. These values were used to calculate the annual effective dose and the health risks for cells bronchial which caused by the inhalatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The Relations Of Design And The Role Of It Making The Idea For Fashion Design: فرات جمال العتابي
...Show More Authors

Any design subject to a set of forces contributing to the establishment of relations working to strengthen the internal elements of the design; any imbalance in these elements can make a fragmented and weak design, thus preventing it from achieving the goal or performance. Poor performance can be attributed to various factors: the extent and function of the elements and principles in the design, realization of the idea, especially in fashion design.
Moreover, there are many aspects of a design that go into achieving the realization of the designer’s idea. The design utilizes a lot of stimulants by drawing attention to its design, which is consistent with the need for psychological and material individuals. In this research, we will

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
Shorthand and Implicit in Graphic Design
...Show More Authors

 Reduction represents a form of artistic abstraction to express things with formal symbols that suggest the content of the idea, as the beauty of the design artwork cannot be unique in the form only, but in revealing its meaning as well. He resorts to shorthand to express the content of his idea related to design necessities and needs to achieve a specific function whose role is crystallized through the form that follows the function. The importance of the research was also represented in: Benefiting workers and scholars in the field of design with regard to shorthand and implicit in graphic design. The aim of the research: to identify the relationship between implicit meaning and reduced forms in graphic design. And the aesthetic of fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 04 2004
Journal Name
5th Scientific Conference Of Engineering College In University Of Baghdad, 25th -27th Of February, Baghdad, Iraq
Technology and lighting in interior Design.
...Show More Authors

Publication Date
Wed Feb 10 2021
Journal Name
Indian Journal Of Economics And Business
The effectiveness of tax exemption in stimulating industrial projects in Iraq
...Show More Authors

Tax is an important financial resource that the state depends on in all its economic, political, and social fields. Nevertheless, the role of the tax is highlighted in raising tax revenues and influencing economic variables, such as savings, consumption, investment, and employment. The tax was taken as an important tool to stimulate investment in industrial projects because of this activity's important role in raising the efficiency of economic development and reviving the national economy, as many industrial investment laws were enacted and the most important thing included was exempting industrial projects from all taxes and fees (5-10) years, and an exemption Profits from income tax for a period of 5 years starting from the year in which

... Show More
Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Evergreen
Development, Validation, and Performance Evaluation of An Air-Driven Free-Piston Linear Expander Numerical Model
...Show More Authors

View Publication Preview PDF
Scopus (3)
Scopus Crossref