Preferred Language
Articles
/
_Bc_mZIBVTCNdQwC9Lhz
Intelligent systems in building;
...Show More Authors

Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Building a Three-Axis CNC Milling Machine Control System
...Show More Authors

CNC machines are widely used in production fields since they produce similar parts in a minimum time, at higher speed and with possibly minimum error. A control system is designed, implemented and tested to control the operation of a laboratory CNC milling machine having three axes that are moved by using a stepper motor attached to each axis. The control system includes two parts, hardware part and software part, the hardware part used a PC (works as controller) connected to the CNC machine through its parallel port by using designed interface circuit. The software part includes the algorithms needed to control the CNC. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD or 3D MAX and is saved in a we

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Appraisal of intelligent notification system for smart university campus based internet of objects for social activities
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Engineering
The Intelligent Auto-Tuning Controller Design Based on Dolphin Echo Location for Blood Glucose Monitoring System
...Show More Authors

This paper presents an enhancement technique for tracking and regulating the blood glucose level for diabetic patients using an intelligent auto-tuning Proportional-Integral-Derivative PID controller. The proposed controller aims to generate the best insulin control action responsible for regulating the blood glucose level precisely, accurately, and quickly. The tuning control algorithm used the Dolphin Echolocation Optimization (DEO) algorithm for obtaining the near-optimal PID controller parameters with a proposed time domain specification performance index. The MATLAB simulation results for three different patients showed that the effectiveness and the robustness of the proposed control algorithm in terms of fast gene

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 22 2021
Journal Name
Expert Systems
Hybrid intelligent technology for plant health using the fusion of evolutionary optimization and deep neural networks
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 16 2022
Journal Name
Journal Of Positive School Psychology
Electronic Publishing And Its Impact On Building And Developing Groups In Jordanian University Libraries
...Show More Authors

Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
"The Effect of Organizational Power Top Management Resources in Building Core Competencies: Analytical Research
...Show More Authors

The problem of the current research as the Iraqi Drilling Company suffers from the many challenges facing its work as a result of the current conditions in Iraq and the subsequent changes in the policies of the State Which left an impact on its activities and objectives, which created pressure on the importance of an organizational power capable of diagnosing the core competencies and development and maintain them to contribute to the raising and success in the performance of the company. The researchers adopted the method of analytical research and adopted the questionnaire as a main tool in the collection of research data and information . It was distributed to a community of (140) individuals from the low mana

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
Building a Training Program in the development of the Willpower of the Kindergarten Children
...Show More Authors

The research aims to build a training program to develop the willpower in the kindergarten children. In order to achieve the objective of the research, the two researchers have developed a Training Program according to the following steps:

- Determining the general objective of the Training Program.

- Determining the behavioral objectives of the Training Program.

- Determining the content of the Training Program.

- Implementing the content of the Training Program sessions.

- Evaluating the Training Program.

The training program consisted of (15) sessions, each session included a set of parts (title, general objective, methods, time and place to implement the sessions, behavioral goals, tool

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The International Conference On Research Advances In Engineering And Technology - Itechcet 2022
Suitability of Iraqi legal system for building operation transfer contract in infrastructure construction projects
...Show More Authors

View Publication
Scopus Crossref