Preferred Language
Articles
/
moa-N4YBIXToZYALeX8N
The effect of power converter on the design of a Linear Alternator for use with a Joule Cycle-Free Piston Engine
...Show More Authors

Scopus Crossref
Publication Date
Sun Dec 31 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
A Ranked-Aware GA with HoG Features for Infant Cry Classification
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 28 2026
Journal Name
Al-fatih Journal
Impact exercises sense of the power arm in the level of performance skill in basketball clapotement
...Show More Authors

أن كرة السلة بما تتضمنه من مهارات حركية متنوعة تتطلب من ممارسيها امتلاك عدد من القدرات الحركية الخاصة وبشكل خاص التوافق العضلي العصبي والرشاقة والقوة المميزة بالسرعة، فضلاعن قدرات الإدراك الحس- حركي (إدراك المكان وقوة دفع الكرة سواء بالطبطبة العالية أو الواطئة .... الخ ) لذا تكمن أهمية البحث في إيجاد الطرق والوسائل التي تطور قدرة الطالبة على إدراك قوة دفع الكرة والإحساس بها أثناء تعلم وتدريب الطبطبة بأنواعها ب

... Show More
View Publication
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Fri Jun 11 2021
Journal Name
Journal Of Computing And Information Technology
A Survey on Emotion Recognition for Human Robot Interaction
...Show More Authors

With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
A Review on Models for Evaluating Rock Petrophysical Properties
...Show More Authors

The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The Approach of Discretion in Contemporary Jurisprudential Issues, with Imam Al-Qaradawi The Jurisprudence of Minorities as a Model
...Show More Authors

Research Objectives: The research aims to highlight the approach of Imam Al-Qaradawi in contemporary jurisprudence in the recent issues of the jurisprudence of minorities, and mentioning the foundations of jurisprudence of minorities, along with some of the practical applications of Imam Al-Qaradawi.

Study Methodology: The researcher applied the inductive, analytical and comparative approach by tracking the scientific material related to the subject of the study from the books of Al-Qaradawi in the first place, then by comparing the legal provisions with what had been stated in the four schools of jurisprudence.

Findings: The interest and need of Muslim minorities in non-

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Middle East Research Journal
The Evolution of Medical Risks and the Standard Adopted for Informing the Patient – A Comparative Study of Positive Legislations
...Show More Authors

The right of the patient to know the medical risks surrounding the medical intervention is one of the most prominent rights based on the principle of "physical safety", which has undergone several stages of development until it reached the development of the patient's independence in making medical decision without relying on the doctor, The patient's prior informed consent is informed of his / her medical condition. We will study this development in accordance with the French March 4, 2002 legislation on the rights of patients in the health system, whether it was earlier and later. We will highlight the development of the patient's right to "know the medical risks surrounding medical intervention" The legislation and its comparison with th

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Stomatology
The effect of Winter’s red line, angle of impaction, and radio-morphometric indices on surgical difficulty of impacted mandibular third molar: a prospective observational study
...Show More Authors

View Publication
Scopus Crossref