Preferred Language
Articles
/
nhdinpIBVTCNdQwCeLo3
Adaptive Reuse of Traditional Architecture under the Influence of Intelligent Systems
...Show More Authors

Publication Date
Fri Jan 01 2021
Journal Name
Signals And Communication Technology
Survey on Twitter Sentiment Analysis: Architecture, Classifications, and Challenges
...Show More Authors

View Publication
Scopus (14)
Crossref (12)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (20)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
A traditional model of translation: Critical analysis: Традиционные модели перевода: критический анализ
...Show More Authors

 

 The article critically analyzes traditional translation models. The most influential models of translation in the second half of the 20th century have been mentioned, among which the theory of formal and dynamic equivalence, the theory of regular correspondences, informative, situational-denotative, functional-pragmatic theory of communication levels have been considered. The selected models have been analyzed from the point of view of the universality of their use for different types and types of translation, as well as the ability to comprehend the deep links established between the original and the translation.

Аннотация

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Assessment of Traditional Asphalt Mixture Performance Using Natural Asphalt from Sulfur Springs
...Show More Authors

This research utilized natural asphalt (NA) deposits from sulfur springs in western Iraq. Laboratory tests were conducted to evaluate the performance of an asphalt mixture incorporating NA and verify its suitability for local pavement applications. To achieve this, a combination of two types of NA, namely soft SNA and hard HNA, was blended to create a binder known as Type HSNA. The resulting HSNA exhibited a penetration grade that adhered to Iraqi specifications. Various percentages of NA (20%, 40%, 60%, and 80%) were added to petroleum asphalt. The findings revealed enhanced physical properties of HSNA, which also satisfied the requirements outlined in the Iraqi specifications for asphalt cement.

Consequently, HS

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
Assessment of Traditional Asphalt Mixture Performance Using Natural Asphalt from Sulfur Springs
...Show More Authors

This research utilized natural asphalt (NA) deposits from sulfur springs in western Iraq. Laboratory tests were conducted to evaluate the performance of an asphalt mixture incorporating NA and verify its suitability for local pavement applications. To achieve this, a combination of two types of NA, namely soft SNA and hard HNA, was blended to create a binder known as Type HSNA. The resulting HSNA exhibited a penetration grade that adhered to Iraqi specifications. Various percentages of NA (20%, 40%, 60%, and 80%) were added to petroleum asphalt. The findings revealed enhanced physical properties of HSNA, which also satisfied the requirements outlined in the Iraqi specifications for asphalt cement. Consequently, HSNA can serve as an

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Al-academy
Aesthetic values of the decorations heterogeneities in Islamic architecture: وسام كامل عبد الامير، أشرف كامل عبد الامير
...Show More Authors

Covariance technique represents a design to bring out the decorative components And organized in unfamiliar a manner Turn to custom patterned to make a qualitative difference in the pattern of the general composition of the implicit overall,question research problem emerges Based on the above, (Is the aesthetic values of the property heterogeneities in Islamic architecture configurations decorations?). Detect it through the knowledge of the species and decorative components containing heterogeneities And his methods within each of Iraq and Iran and theoretical framework try to monitor the opinions and threads aesthetic perception in the Islamic and Construction decorative art formations in Islamic architecture and features of heterogenei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The impact of electronic payment systems on the effectiveness of monetary policy
...Show More Authors

Information and Communication Technology  revolution has led to the emergence of electronic payment systems and their means And that the replacement of these modern means replace the traditional means (legal money) issued by the Central Bank has influenced the performance of monetary policy, especially that monetary policy is one of the most important policies used to achieve economic stability ,  The aim of the research is To know the impact of electronic payment systems on the tools of monetary policy as these means, such as cards and electronic money issued by credit institutions and companies, that is, the Central Bank is not responsible for issuance and spread And the lack of regulation by the Central Bank will lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
FACE IDENTIFICATION USING BACK-PROPAGATION ADAPTIVE MULTIWAVENET
...Show More Authors

Face Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a

... Show More
View Publication Preview PDF
Crossref