A Neural-Network-Based Simulated Model for Controlling Electrical Furnace Using Silicon Carbide Heating Elements
A Neural-Network-Based Simulated Model for Controlling Electrical Furnace Using Silicon Carbide Heating Elements

Suhail M. Ali

Volume 6, Issue 2 , August 2012, , Page 34-40

https://doi.org/10.37652/juaps.2012.63235

Abstract
  is obvious that Artificial Neural Networks (ANN) is a successful method for system control and simulating nonlinear loads. This paper suggests an ANN model that can simulate the effects ...  Read More ...
The New Intelligent System for the Protection of E-learning from Penetration
The New Intelligent System for the Protection of E-learning from Penetration

Waleed khaled; Salah M. Arawi; Khattab M. Ali Alheeti

Volume 6, Issue 2 , August 2012, , Page 41-44

https://doi.org/10.37652/juaps.2012.63236

Abstract
  This paper focuses on the design new intelligent system to prevent the e-learning from attack. electronic learning (e-learning) systems are becoming widely used tools for distance education/training ...  Read More ...
Design of Embedded Image Processing System Using FPGAs
Design of Embedded Image Processing System Using FPGAs

Sara A. Mohamed; Mazen R. Khalil

Volume 6, Issue 2 , August 2012, , Page 45-49

https://doi.org/10.37652/juaps.2012.63237

Abstract
  The work aims to design an image processing system to be configured on Spartan-3E FPGA. Embedded design techniques were adopted to construct a soft core processor system. Intel strata ...  Read More ...
Copyright Authentication By Using Karhunen-Loeve Transform
Copyright Authentication By Using Karhunen-Loeve Transform

Ghada Thanon Yuonis; Sundus Khaleel Ebraheem; Khalil I. Al

Volume 6, Issue 2 , August 2012, , Page 50-57

https://doi.org/10.37652/juaps.2012.63238

Abstract
  Authentication is a raised as one of the important subject in field of security. So many techniques for improving authentication were appeared during the last three decades.This paper ...  Read More ...
Key Management Scheme for Mobile Wireless Sensor Networks
Key Management Scheme for Mobile Wireless Sensor Networks

Sufyan T. Faraj; Foad Salem Mubarek

Volume 6, Issue 2 , August 2012, , Page 58-64

https://doi.org/10.37652/juaps.2012.63239

Abstract
  Wireless sensor networks (WSNs) are infrastructure-less and resource constraint networks composed of many sensor nodes. These sensors collect information from the area of sense and ...  Read More ...
AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS
AN IMPLEMENTATION OF FIREWALL SYSTEM USING MIKROTIK ROUTER OS

Shaymaa W. Abdulatteef

Volume 6, Issue 2 , August 2012, , Page 65-69

https://doi.org/10.37652/juaps.2012.63240

Abstract
  This work concerned with implementing packet filtering firewall by using Mikrotik Router OS, and tested on a LAN. In the host machine, the programs VMware workstation and Wireshark ...  Read More ...
TORDES-THE NEW SYMMETRIC KEY ALGORITHM
TORDES-THE NEW SYMMETRIC KEY ALGORITHM

Pawitar Dulari; Ajay Bhushan

Volume 6, Issue 2 , August 2012, , Page 70-74

https://doi.org/10.37652/juaps.2012.63241

Abstract
  The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies ...  Read More ...
Back propagation Neural Network Proposed Algorithm to learn deaf a Computer Commands by Hand Gestures
Back propagation Neural Network Proposed Algorithm to learn deaf a Computer Commands by Hand Gestures

Azmi shawkat abdulbaki

Volume 6, Issue 2 , August 2012, , Page 75-78

https://doi.org/10.37652/juaps.2012.63242

Abstract
  Sign language Plays important role in activating the relation between people and computers , through the activation of the concept of hand movements and provide easier way for people ...  Read More ...
New Construction of a Chaotic Generator on the Lorenz Attractor
New Construction of a Chaotic Generator on the Lorenz Attractor

Abdallah M; Mohamed Sadek Ali-Pacha; Naima Hadj-Said; Adda Ali-Pacha

Volume 6, Issue 2 , August 2012, , Page 79-84

https://doi.org/10.37652/juaps.2012.63243

Abstract
  it be known that the chaotic phenomena can be obtained from relatively simple systems that are governed by a small number of variables. The system will then be deterministic, although ...  Read More ...
Improving Efficiency of Round Robin Scheduling Using Ascending Quantum And Minumim-Maxumum Burst Time
Improving Efficiency of Round Robin Scheduling Using Ascending Quantum And Minumim-Maxumum Burst Time

Ali Jbaeer Dawood

Volume 6, Issue 2 , August 2012, , Page 85-89

https://doi.org/10.37652/juaps.2012.63364

Abstract
  Round Robin (RR) is a kind of process algorithms, where the time quantum is fixed along the processes execution. In the other hand it depending on the First Come First Serve (FCFS) ...  Read More ...
The Mechanism of Monitoring and Tracking of Healthcare Systems
The Mechanism of Monitoring and Tracking of Healthcare Systems

Khattab M. Ali Alheeti; Raed I. Hamed; Muzhir Shaban Al-Ani

Volume 6, Issue 2 , August 2012, , Page 90-94

https://doi.org/10.37652/juaps.2012.63365

Abstract
  This work concerned with e-healthcare that transmit digital medical data through healthcare system. Online monitoring is concentrated on the process of monitoring and tracking of people ...  Read More ...
The Role of Metadata for Effective Data Warehouse
The Role of Metadata for Effective Data Warehouse

Alaa Abdulqahar Jihad; Murtadha M. Hamad

Volume 6, Issue 2 , August 2012, , Page 95-100

https://doi.org/10.37652/juaps.2012.63366

Abstract
  Metadata efficient method for managing Data Warehouse (DW). It is also an effective tool in reducing the time or speed to answer queries. In addition, it achieved capabilities of the ...  Read More ...
The Use of Two Transform Methods in Fingerprints Recognition
The Use of Two Transform Methods in Fingerprints Recognition

Baraa Tareq Hammad; Khattab M. Ali; Salah Sleibi Al-Rawi; Ismail Taha Ahmed

Volume 6, Issue 2 , August 2012, , Page 101-108

https://doi.org/10.37652/juaps.2012.63367

Abstract
  Finger prints are the oldest and most widely used form of biometric identification. Despite the widespread use of fingerprints, there is little statistical theory on the uniqueness ...  Read More ...
Data Hiding In Contourlet Coefficients Based On Their Energy
Data Hiding In Contourlet Coefficients Based On Their Energy

Khalil I. Alsaif; Nagham S. AL-lella

Volume 6, Issue 2 , August 2012, , Page 109-123

https://doi.org/10.37652/juaps.2012.63368

Abstract
  The data hiding is one of the most important subject in field of computer science, so a lot of technique was developed and modified to satisfy the optimum lend of hiding. In this research ...  Read More ...
Design and Multiplierless Implementations of ECG-Based 1st Order Gaussian Derivative Wavelet Filter with Lattice Structures
Design and Multiplierless Implementations of ECG-Based 1st Order Gaussian Derivative Wavelet Filter with Lattice Structures

Abdulhamed M. Jasim; Jassim M. Abdul-Jabbar

Volume 6, Issue 2 , August 2012, , Page 124-134

https://doi.org/10.37652/juaps.2012.63369

Abstract
  In this paper, the 1st order Gaussian derivative wavelet function utilized in the design of some corresponding filter banks. Since the 1st order Gaussian derivative function has a similar ...  Read More ...
DCT Image Compression by Run-Length and Shift Coding Techniques.
DCT Image Compression by Run-Length and Shift Coding Techniques.

Bilal Kamal Ahmed

Volume 5, Issue 3 , December 2011, , Page 39-44

https://doi.org/10.37652/juaps.2011.44309

Abstract
  The mathematical concept of a DCT transform is a powerful tool in many areas; it is also, served as an approach in image processing discipline. In this work an image is processed as ...  Read More ...
Developed Protocol for Key Exchange Based on Irreducible Polynomial
Developed Protocol for Key Exchange Based on Irreducible Polynomial

Abdul Monem S. Rahma; Rabah N. Farhan; Hussam J. Mohammad

Volume 5, Issue 3 , December 2011, , Page 45-49

https://doi.org/10.37652/juaps.2011.44312

Abstract
  The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman ...  Read More ...
٣ حاسوبیاً ×٣× خوارزمیة مقترحة لحل مسألة مکعب روبک ٣
٣ حاسوبیاً ×٣× خوارزمیة مقترحة لحل مسألة مکعب روبک ٣

Isra Natheer Alkallak

Volume 5, Issue 3 , December 2011, , Page 57-64

https://doi.org/10.37652/juaps.2011.44314

Abstract
  This paper tackled recruitment of computer to solve Rubik's cube ٣×٣×٣ through a proposed algorithm generate 4 steps (movements) for each face of Rubik's cube's faces ...  Read More ...
Web Usage Pattern Discovery Using Time Stamp Association Rules
Web Usage Pattern Discovery Using Time Stamp Association Rules

Nidal Ali Hussein

Volume 4, Issue 2 , August 2010, , Page 99-104

https://doi.org/10.37652/juaps.2010.15363

Abstract
  Abstract: Association rules are typically used to describe what items are frequently bought together. One could also use them in web usage mining to describe the pages that are often ...  Read More ...
Design and Implementation of Virtual Grid-Based Parallel Computer (VGBPC)
Design and Implementation of Virtual Grid-Based Parallel Computer (VGBPC)

Rabah Nory Farhan

Volume 3, Issue 3 , December 2009, , Page 101-108

https://doi.org/10.37652/juaps.2009.15638

Abstract
  : Many Areas in Science and industrial applications requires huge computation power that is must achieve the desired level of computation. The field of distributed computing covers ...  Read More ...
Fibers Direction Effect on Tensile Elasticity of Epoxy Composites Using Computer modeling
Fibers Direction Effect on Tensile Elasticity of Epoxy Composites Using Computer modeling

Salah S. Al-Rawi

Volume 3, Issue 3 , December 2009, , Page 109-115

https://doi.org/10.37652/juaps.2009.15573

Abstract
  In this research a sample of glass fiber reinforced Epoxy Composite was subjected to a tensile load to study the effect of fiber directions on the tensile elasticity theoretically using ...  Read More ...
The Numerical Solution for Energy Levels for Harmonic Oscillator and Perturbation Parameters (λ, g, µ, α, I ,N ,M
The Numerical Solution for Energy Levels for Harmonic Oscillator and Perturbation Parameters (λ, g, µ, α, I ,N ,M

Abdul-Adeem Z. Hameed

Volume 3, Issue 1 , April 2009, , Page 95-102

https://doi.org/10.37652/juaps.2009.15491

Abstract
  he study of energy levels for Harmonic Oscillator a one-dimensional are calculated by eigenvalues and eigenenergy for Schrodinger equation ( ; , , ) ( ) 0 2 2 = ú û ù ...  Read More ...
A STUDY OF EFFECT OF REINFORCING FIBERS DIRECTION FOR THE POLYMER COMPOSITES ON THE THERMAL CHARACTERIZATION USING COMPUTER MODELING
A STUDY OF EFFECT OF REINFORCING FIBERS DIRECTION FOR THE POLYMER COMPOSITES ON THE THERMAL CHARACTERIZATION USING COMPUTER MODELING

Raid Khidr Selman

Volume 2, Issue 3 , December 2008, , Page 65-75

https://doi.org/10.37652/juaps.2008.15628

Abstract
  ABSTRACT:The study was created using "ANSYS 5.4" the Physical CAD tool to find out the effect of fiber direction on thermal characterization for tow types of the polymer composites. ...  Read More ...
ERROR CORRECTING CODE USING LATIN SQUARE
ERROR CORRECTING CODE USING LATIN SQUARE

Makarim Abdul-Waheed.Abdul-Jabbar; Ali Makki Sagheer

Volume 2, Issue 3 , December 2008, , Page 81-91

https://doi.org/10.37652/juaps.2008.15649

Abstract
  ABSTRACT:Digital data stored in computers or transmitted over computer networks are constantly subject to error due to the physical medium in which they are stored or transmitted. Error-correction ...  Read More ...
STUDY OF AMYLASE ENZYME AND AMYLASE CREATININE CLEARACE RATE IN NON INSULIN DEPENDENT DIABETES MELLITUS
STUDY OF AMYLASE ENZYME AND AMYLASE CREATININE CLEARACE RATE IN NON INSULIN DEPENDENT DIABETES MELLITUS

BAKAA H. ISMAIL

Volume 2, Issue 3 , December 2008, , Page 82-87

https://doi.org/10.37652/juaps.2008.15641

Abstract
  The aim of this study was determined to check the effect of NIDDM on Amylase Enzyme and amylase creatinine clearance rate. The specimens were collected from 48 patients suffering from ...  Read More ...