Preferred Language
Articles
/
jcopolicy-628
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Active Vibration Control of Cantilever Beam by Using Optimal LQR Controller
...Show More Authors

Many of mechanical systems are exposed to undesired vibrations, so designing an active vibration control (AVC) system is important in engineering decisions to reduce this vibration. Smart structure technology is used for vibration reduction. Therefore, the cantilever beam is embedded by a piezoelectric (PZT) as an actuator. The optimal LQR controller is designed that reduce the vibration of the smart beam by using a PZT element.  

In this study the main part is to change the length of the aluminum cantilever beam, so keep the control gains, the excitation, the actuation voltage, and mechanical properties of the aluminum beam for each length of the smart cantilever beam and observe the behavior and effec

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
Microbiology of active chronic otitis media: in comparison with abroad studies
...Show More Authors

Background: Chronic otitis media (COM) of mucosal or squamous type is a common problem in otolaryngology practice, the active form of COM is characterized by discharge of pus and is treated by antibiotics to start with, the appropriate antibiotic should be prescribed to avoid antibiotic abuse and guarantee good outcome. Objectives:The objective of this study is to identify the causative organisms of active chronic active otitis media both (mucosal, squamous) type and test their sensitivity to various anti- microbial agents &compare with abroad studies.Methods:A prospective study was done on eighty patients, different ages and sexes were taken and carful history and examination was done, examination under microscope was done with carf

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
International Journal Of Vlsi Design & Communication Systems (vlsics)
SIMULTANEOUS OPTIMIZATION OF STANDBY AND ACTIVE ENERGY FOR SUB THRESHOLD CIRCUITS
...Show More Authors

Increased downscaling of CMOS circuits with respect to feature size and threshold voltage has a result of dramatically increasing in leakage current. So, leakage power reduction is an important design issue for active and standby modes as long as the technology scaling increased. In this paper, a simultaneous active and standby energy optimization methodology is proposed for 22 nm sub-threshold CMOS circuits. In the first phase, we investigate the dual threshold voltage design for active energy per cycle minimization. A slack based genetic algorithm is proposed to find the optimal reverse body bias assignment to set of noncritical paths gates to ensure low active energy per cycle with the maximum allowable frequency at the optimal supply vo

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Semi-Active Damping of Mechanical Vibrating Systems Using Variable Stiffness Actuator
...Show More Authors

      In this research, a variable stiffness actuator is proposed to enhance the damping of the mechanical vibrating system. The frequency response analysis of the vibrating system is dependant in order to analyze and synthesis this semi-active damping, where the suggested process is using active filter to estimate the present frequency of the vibration system, and this will limit the value of the stiffness of the vibrated system. Two active filter s are needed, low-pass-filter (LPF) to choose the higher stiffness of the actuator at small frequencies as well as more damping and high-pass-filter (HPF) to choose the lower stiffness of the actuator at high frequencies as well as more damping, and so

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Intelligent H2/H∞ Robust Control of an Active Magnetic Bearings System
...Show More Authors

Abstract

Robust controller design requires a proper definition of uncertainty bounds. These uncertainty bounds are commonly selected randomly and conservatively for certain stability, without regard for controller performance.  This issue becomes critically important for multivariable systems with high nonlinearities, as in Active Magnetic Bearings (AMB) System. Flexibility and advanced learning abilities of intelligent techniques make them appealing for uncertainty estimation. The aim of this paper is to describe the development of robust H2/H controller for AMB based on intelligent estimation of uncertainty bounds using Adaptive Neuro Fuzzy Inference System (ANFIS).  Simulatio

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Determinants of economic growth in Arab Countries: An Empirical Study compared with South-east Asia
...Show More Authors

The study addresses the problem of stagnation and declining economic growth rates in Arab countries since the eighties till today after the progress made by these countries in the sixties of the last century. The study reviews the e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Computing And Digital Systems
The Perception of Information Security Threats Surrounding the Cloud Computing Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 10 2023
Journal Name
Current Microbiology
Influence of Light Color on Power Generation and Microalgae Growth in Photosynthetic Microbial Fuel Cell with Chlorella Vulgaris Microalgae as Bio-Cathode
...Show More Authors

View Publication
Crossref (4)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Performance Evaluation of Mobility Models over UDP Traffic Pattern for MANET Using NS-2
...Show More Authors

  The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes,  different traffic rates, different traffic sources, different pause times and different simulation times .  A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref