Preferred Language
Articles
/
Txf1Q48BVTCNdQwC2mjf
Pathfinding in Strategy Games and Maze Solving Using A* Search Algorithm
...Show More Authors

Crossref
View Publication
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Computer Science
Dropping down the Maximum Item Set: Improving the Stylometric Authorship Attribution Algorithm in the Text Mining for Authorship Investigation
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 28 2019
Journal Name
Al-khwarizmi Engineering Journal
Heuristic D* Algorithm Based on Particle Swarm Optimization for Path Planning of Two-Link Robot Arm in Dynamic Environment
...Show More Authors

 Finding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved.  In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Educational And Psychological Researches
The impact of discrete realization strategy in the development of reflective thinking among students of Qur'an and Islamic education departments for the course of Islamic jurisprudence
...Show More Authors

The paper aims to identify the impact of discrete realization strategy in the development of reflective thinking among students: (males/females) of Qur'an and Islamic education departments for the course of Islamic jurisprudence according to the variability of sex. The researcher used the experimental approach and adopted an experimental determination with a set part of the two groups (experimental and controlled). He selected the sample deliberately which consists of (147) students spread over four classes (experimental males/ experimental females/ controlled males/ controlled females), and it took last for an academic year of (2010-2011). He, then, prepared a post test to measure the reflective thinking with his five skills (skill of o

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Reconstruction of Three-Dimensional Object from Two-Dimensional Images by Utilizing Distance Regularized Level Algorithm and Mesh Object Generation
...Show More Authors

Three-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The effect of the reciprocal reading strategy in developing innovative reading skills for fifth-year secondary school students / scientific branch
...Show More Authors

       This research aims to identify the impact of the reciprocal reading strategy on developing the innovative reading skills of fifth-grade secondary school students/ scientific branch. To achieve the goal of the research, an achievement test to measure the academic achievement of fifth-grade secondary school students in  Arabic language grammar was prepared,  a sample of (60) female students from the secondary school of Al- Bawaba Al-Sharkey for Girls in Baghdad were chosen for the academic year (2019-2020). For the purpose of applying the experiment, the test was applied on a pilot sample consisting of (30) students from the same research community. The researcher herself had taught the three

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Idea Filtering Strategy on the Achievement of the Second Year Middle School Female Students in Science
...Show More Authors

Abstract

The current research aims to identify the effect of the idea filtering strategy on the achievement of second-intermediate school female students in science. The two researchers adopted the experimental method and the experimental design with partial control in the two groups (experimental group and control group). The two researchers applied the research experience to a sample of students of the second intermediate grade in the school Martyrs of (Jiser  Al Aimma for Girls) affiliated with the Baghdad Education Directorate / Rusafa /1 for the academic year (2021/2022), which was chosen intentionally. The number of female students in the research sample was (70) students, with (35) students for the ex

... Show More
View Publication Preview PDF