The article includes the concept of aesthetics through what has been dealt with in the literature by philosophers and researchers who have addressed this concept in an attempt to derive indicators of aesthetics. The article adopted a descriptive and analytical methodology by reviewing recent literature on the concept of aesthetics and its relation to urban planning and design issues. Many subjective and objective aesthetics indicators have been identified, some of which are classified under real aesthetics, and some under fake aesthetics. The indicators were applied to the Kufa Mosque complex and Sahla Mosque complex as a comparative case study. It was found that the indicators of real aesthetics have a higher weight in determining
... Show MoreIn this study, silver-tungsten oxide core–shell nanoparticles (Ag–WO3 NPs) were synthesized by pulsed laser ablation in liquid employing a (1.06 µm) Q-switched Nd:YAG laser, at different Ag colloidal concentration environment (different core concentration). The produced Ag–WO3 core–shell NPs were subjected to characterization using UV–visible spectrophotometry, X-ray diffraction (XRD), transmission electron microscopy (TEM), energy-dispersive spectroscopy, electrical analysis, and photoluminescence PL. The UV–visible spectra exhibited distinct absorption peaks at around 200 and 405 nm, which attributed to the occurrence of surface Plasmon reson
This study successfully synthesized high-performance photodetectors based on Ag-WO3 core–shell heterostructures using a simple and economical two-step pulsed laser ablation in water method and has investigated the electrical characteristics of the Ag@WO3 nanocomposite heterojunction. The Hall effect tests indicate that the synthesized Ag@WO3 exhibits n-type conduction with a Hall mobility of 1.25 × 103 cm2V-1S-1. Dark current–voltage properties indicated that the created heterojunctions displayed rectification capabilities, with the highest rectification factor of around 1.71 seen at a 5 V bias. A photodetector’s responsivity reveals the existence of two response peaks, which are situated in the ultraviolet and visible region. The ph
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreBackground: Dysfunction of sinoatrial node is a set of abnormal rhythms which are resulted from the sinoatrial node malfunction of the sinus node, the chief natural cardiac pacemaker. The common, and occasionally, the single method for treatment of heart arrhythmias was implantation of pacemaker, which reduce symptoms exactly occurs after implantation. Aim: To detect the role of smoking on cardiac electrophysiology parameters in sinus node dysfunction in Iraqi patients such as SNRT and AH. Methods: A cross sectional study, was conducted on 59 patient ranging between 20-50 years old and involving 35 female and 24 male patients, suffering from an unexplained symptoms of sinoatrial node dysfunction (SND). The enrolled participants were gathere
... Show MorePhotonic Crystal Fiber Fabry–Perot Interferometers (FPI) based on Surface Plasmon Resonance (SPR) was investigated in this paper in order to detect changes in photonic crystal fiber sensitivity with increasing temperature. FPI is composed of a PCF (ESM-12) solid core spliced with a single-mode fiber (SMF) on one side and a 40nm thick gold Nano film on the other. In order to obtain the SPR curve, the end of PCF can be spliced with the side of SMF before covering the gold film on the PCF. SPR results are included in the suggested sensor, based on the conclusions of the investigations. Resolution (R) is 0.0871, Signal-to-Noise Ratio (SNR) is 0.1867, a figure of merit (FOM) is 0.0069, and sensitivity (S) is 1.1481 . This sensor proposed is s
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show More: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro
... Show MoreNAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010
NAA Mustafa, University of Sulaimani, Ms. c Thesis, 2010 - Cited by 4
ST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013
The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThis study investigates the requirements of total quality management (TQM) and the determinants affecting its application in Al-Zaman newspaper, one of Iraq’s leading private press institutions. The research employed a survey methodology, using a structured questionnaire administered to 30 participants representing journalistic, administrative, and technical staff. Five TQM dimensions, each measured through four indicators, were assessed to capture the perceptions of employees regarding the availability and effectiveness of quality practices. Data were analyzed using the Statistical Package for the Social Sciences (SPSS). The results revealed that while senior management at Al-Zaman demonstrates formal support for TQM, there is a
... Show More