Preferred Language
Articles
/
bsj-986
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Control System Development of Cap-Seal Assembling Machine
...Show More Authors

   

View Publication
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Sustainability Assessment System for Highrise Buildings in Iraq
...Show More Authors
Abstract<p>This study aims to preparation a standards code for sustainability requirements to contribute in a better understanding to the concept of sustainability assessment systems in the dimensions of Iraqi projects in general and in the high-rise building. Iraq is one of the developing countries that faced significant challenges in sustainability aspects environmental, economic and social, it became necessary to develop an effective sustainability building assessment system in respect of the local context in Iraq. This study presented a proposal for a system of assessing the sustainability requirements of Iraqi high rise buildings (ISHTAR), which has been developed through several integrated</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 11 2019
Journal Name
Journal Of Mechanical Engineering Research And Developments
INDUSTRIAL TRACKING CAMERA AND PRODUCT VISION DETECTION SYSTEM
...Show More Authors

View Publication
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023

View Publication
Scopus (7)
Scopus
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Iraqi Journal Of Physics
Investigation of Numerical Simulation for Adaptive Optics System
...Show More Authors

In this study, the performance of the adaptive optics (AO) system was analyzed through a numerical computer simulation implemented in MATLAB. Making a phase screen involved turning computer-generated random numbers into two-dimensional arrays of phase values on a sample point grid with matching statistics. Von Karman turbulence was created depending on the power spectral density. Several simulated point spread functions (PSFs) and modulation transfer functions (MTFs) for different values of the Fried coherent diameter (ro) were used to show how rough the atmosphere was. To evaluate the effectiveness of the optical system (telescope), the Strehl ratio (S) was computed. The compensation procedure for an AO syst

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Global virtual teams management system: project manager guide
...Show More Authors

Global virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Transactions On Computers
Neuromorphic System for Spatial and Temporal Information Processing
...Show More Authors

View Publication
Scopus (22)
Crossref (12)
Scopus Clarivate Crossref