Preferred Language
Articles
/
7BZodIcBVTCNdQwCy0sU
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The extent of theatrical and musical arts contribute to the diagnosis And treatment of psychological problems Inmates of
...Show More Authors

 The research aims to identify the extent to which the theatrical and musical arts contribute to diagnosing and treating psychological problems among the residents of children’s villages in Jordan, and the methodologies adopted by the theatrical and musical arts to achieve this. It moves on to prove the theory that theatrical and musical arts have an impact on improving the psychology of the residents of children’s villages in Jordan by reviewing the theories and opinions that address the subject from a scientific point of view proven by experiences and expertise. The research took place in the period between (2019-2020), and the spatial limits came within the (SOS) children's villages in Jordan. The importance of the research is to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
The Role of the Social Networking Site (Facebook) in the Adjustment of Youth Trends / Community Issues and Problems
...Show More Authors

Recent technological developments in the mass media a major paradigm shift in important segments of society, particularly among young people in particular social networking sites including (Facebook) .
it was able to link the sprawling parts of the world and paved the way for all the communities of convergence and exchange views, ideas and desires as provided by their ability to communicate through the use of video clips,pictures,share files, chat, communicate and direct interaction between the audience for this the means. Wondered problem Find the role that can be played using the university youth to the social networking site (Facebook ) to modify their attitudes or their interest in Iraqi society issues, With focused research objec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
Studying the Electron Energy Distribution Function (EEDF) and Electron Transport Coefficients in SF6 – He Gas Mixtures by Solving the Boltzmann Equation
...Show More Authors

The Boltzmann equation has been solved using (EEDF) package for a pure sulfur hexafluoride (SF6) gas and its mixtures with buffer Helium (He) gas to study the electron energy distribution function EEDF and then the corresponding transport coefficients for various ratios of SF6 and the mixtures. The calculations are graphically represented and discussed for the sake of comparison between the various mixtures. It is found that the various SF6 – He content mixtures have a considerable effect on EEDF and the transport coefficients of the mixtures

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 12 2016
Journal Name
Revista Pesquisa Em Fisioterapia
YOGA AS A TREATMENT FOR MUSCULOSKELETAL DISCOMFORTS: A HYPOTHESIS
...Show More Authors

Introduction: Nowadays, the prevalence of Musculoskeletal Discomforts (MSD) is increasing in the world. As treatment, usually surgery or physiotherapyare recommended, but they are expensive and may cause side effects. Apracticalcourse of treatment without negative side effects and with permanent positive effects is lacking. Objective: To suggest a practical course of treatment, introduced by a licensed Yoga coach who is experienced in this field, and through thatto shed a light on yoga as treatment for MSD. The hypothesis is that yoga may decrease the pain among individuals with MSD. Methods: This hypothesis is presented based on the practical techniques used in Yoga including body relaxation and breathing awareness (2 minutes & 3 minutes r

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Sun May 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Combining Arabic Nested Noun Compound and Collocation Extraction Using Linguistic and Statistical Approach
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Mar 31 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Behavior of Clay Masonry Prism under Vertical Load Using Detailed Micro Modeling Approach
...Show More Authors

The aim of this research is to assess the validity of Detailed Micro-Modeling (DMM) as a numerical model for masonry analysis. To achieve this aim, a set of load-displacement curves obtained based on both numerical simulation and experimental results of clay masonry prisms loaded by a vertical load. The finite element method was implemented in DMM for analysis of the experimental clay masonry prism. The finite element software ABAQUS with implicit solver was used to model and analyze the clay masonry prism subjected to a vertical load. The load-displacement relationship of numerical model was found in good agreement with those drawn from experimental results. Evidence shows that load-displacement curvefound from the finite element m

... Show More
Crossref (1)
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
The Electric Energy Generation Approach of the Energy Saving House Using Photovoltaic System
...Show More Authors

This paper describes a research effort that aims of developing solar models for housing suitable for the Arabian region since the Arabian Peninsula is excelled with very high levels of solar radiation.
The current paper is focused on achieving energy efficiency through utilizing solar energy and conserving energy. This task can be accomplished by implementation the major elements related to energy efficiency in housing design , such as embark on an optimum photovoltaic system orientation to maximize seize solar energy and produce solar electricity. All the precautions were taken to minimizing the consumption of solar energy for providing the suitable air-condition to the inhibitor of the solar house in addition to use of energy effici

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref