To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic similarity scores that ranged from 0.85 to 0.98, the Cyber-Neutrosophic Model proved to have higher analysis accuracy. Additionally, it provided robust data security by utilizing Advance Encryption Standards (AES)-256 with Role-Based Access Control.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThe Indoor Environmental Quality (IEQ) describes an indoor space condition that the wellbeing and comfortability are provided for the users. Many researchers have highlighted the importance of adopting IEQ criteria, although they are not yet well defined in the Kurdistan region. However, environmental quality is not necessary for the contemporary buildings of the Kurdistan Region, and there is no measurement tool in the Region. This research aims to develop an IEQ assessment tool for the Kurdistan region using Mixed method methodology, both qualitative and quantitative. Therefore, a Delphi Technique was used as a method initially developed as systematic, interactive forecasting on a panel of experts. Thirty-five Delphi C
... Show MoreThe topic of context is one of the important topics, which was mentioned as a concept in several fields and different fields, and there were many points of view that defined that concept.
He specified the title of the research (design contexts in the design of the interior space), as the research sought to identify the concept of context in the interior design of the spaces of sewing workshops. The research was divided into four chapters:
The first chapter, which consists of the methodological framework, the problem of research and the need for it, the importance of research, the goal and limits of research for sewing workshops for vocational schools from (2020-2021).
The second chapter: consists of previous studies and the theo
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe phenomenon of young people frequenting closed cafes spread in Baghdad to smoke hookahs and cigarettes has increased. This phenomenon is associated with unemployment, an increase in leisure time and the deterioration of economic conditions. This phenomenon has an impact on indoor air quality and exposes workers to the risk of exposure to various pollutants, including particulate matter, therefore, we examined some indicators (PM2.5, PM10) IAQ for a month in summer and another month in winter in six different locations in the Rusafa district. PM2.5 and PM10 concentrations, relative humidity (RH) and temperatures were measured using (Multifunction Air Quality Detector BENETECH -China). The results showed an increase in temperatures inside
... Show More<p>The directing of a wheeled robot in an unknown moving environment with physical barriers is a difficult proposition. In particular, having an optimal or near-optimal path that avoids obstacles is a major challenge. In this paper, a modified neuro-controller mechanism is proposed for controlling the movement of an indoor mobile robot. The proposed mechanism is based on the design of a modified Elman neural network (MENN) with an effective element aware gate (MEEG) as the neuro-controller. This controller is updated to overcome the rigid and dynamic barriers in the indoor area. The proposed controller is implemented with a mobile robot known as Khepera IV in a practical manner. The practical results demonstrate that the propo
... Show MoreThis work represents development and implementation a programmable model for evaluating pumping technique and spectroscopic properties of solid state laser, as well as designing and constructing a suitable software program to simulate this techniques . A study of a new approach for Diode Pumped Solid State Laser systems (DPSSL), to build the optimum path technology and to manufacture a new solid state laser gain medium. From this model the threshold input power, output power optimum transmission, slop efficiency and available power were predicted. different systems configuration of diode pumped solid state laser for side pumping, end pump method using different shape type (rod,slab,disk) three main parameters are (energy transfer efficie
... Show MoreEach project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co