Preferred Language
Articles
/
-RboGYcBVTCNdQwCOTa1
Load balancing by dynamic BBU-RRH mapping in a self-optimised Cloud Radio Access Network
...Show More Authors

Crossref
View Publication
Publication Date
Sat Jun 02 2018
Journal Name
American Academic Scientific Research Journal For Engineering, Technology, And Sciences
Girder Load Share for the Curved I-Girder Bridge Subjected to the Point Load
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Jun 02 2016
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
Girder Load Share for the Curved I-Girder Bridge Subjected to the Point Load
...Show More Authors

The objective of this research is to study experimentally and theoretically the girder vertical load share of the curved I-Girder bridges subjected to the point load in addition to the self-weigh and supper imposed dead loads. The experimental program consist of manufacturing and testing the five simply supported bridge models was scaled down by (1/10) from a prototype of 30m central span. The models carriageway central radii are 30 m, 15m or 10m. The girder spacing of the first two models is 175 mm with an overall carriageway width of 650mm. The girder spacing of the other three bridge models is 200mm with the overall carriageway width of 700 mm. The overall depth of the composite section was 164 mm. To investigate the effect of live load

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
International Journal Of Physics And Research
PROPERTIES OF JOVIAN RADIO BURSTS AT FREQUENCY 20.1 MHZ
...Show More Authors

In this paper, a study was made to determine the properties of Jovian radio bursts emitted at frequency 20.1MHZ. The data were provided from the Radio Jove archive for twelve years (2000-2012) for multi stations. The duration time for Long bursts (L) was (10-30) seconds and for Short bursts (S) was (10-20) seconds. The effect of radio bursts from the Sun and the galactic background were calculated at the same frequency and were found that radio bursts from the Sun will reduce the occurrence probability of Jovian radio bursts much more than radio bursts from the galactic background. The distribution of Jovian radio bursts was different; the occurrence probability with respect to the northern latitudes was more than the southern latitudes.

Publication Date
Sat Jan 01 2022
Journal Name
Teikyo Medical Journal
Refined radio-anatomical lumber level of iliac crest attic
...Show More Authors

Teikyo Medical and medicine Journal (ISSN:03875547) is a monthly peer reviewed fast publishing international medical and medicine journal that aims to publish good quality of Medical and pharmaceutical, medicine and health science Journal.

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Assessment of X-Ray Effects on HF Radio Communications
...Show More Authors
Abstract<p>This study aims to determine the effect of x-ray radiation resulting from solar flares in high-frequency radio wave communications through the ionosphere and to study the radio blackout events that occur over Iraq, located within (38,28) latitude, and (38,49) longitude. Using X-ray data during strong X flares and radio wave absorption data across the D ionosphere for 10 years from 2012 to 2021. The study concluded that there were 43 events of x-flare, most of which were during years of high solar activity. All of these flares produced X-rays that caused a radio blackout, R3 and only 13 events affected Iraq.</p>
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 26 2013
Journal Name
Astronomy &amp; Astrophysics
High-resolution observations of SDSS J080800.99+483807.7 in the optical and radio domains
...Show More Authors

View Publication
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref