Preferred Language
Articles
/
2Bi_spQBVTCNdQwCEx64
Using <scp>5G</scp> Standards for Smart Healthcare Applications and Designing an Artificial Intelligence‐Based Industry 4.0 Communication System
...Show More Authors
ABSTRACT<p>The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing resource usage, managing mobility, ensuring cost‐efficiency, managing interference, and maximizing spectral efficiency. The fast advancement of artificial intelligence (AI) in several domains yields improved performance in contrast to traditional methods. Hence, including AI in 5G standards would enhance performance by catering to diverse end‐user applications. Initially, we provide an overview of concepts such as Industry 4.0, the 5G standard, and recent developments in the sphere of wireless communications in the future. The goal is to use 5G technology to look at current research problems. We present a new architecture for Industry 4.0 and 5G‐compliant smart healthcare systems. We develop and run the proposed model to investigate the current 5G methods using the Network Simulator (NS2). The results of the simulation show that 5G resource management and interference management approaches already in use face challenges including performance trade‐offs.</p>
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Ieice Transactions On Communications
Fast Handoff Scheme for Cluster-Based Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2011
Journal Name
Al-mustansiriyah Journal Of Science
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Retina Based Glowworm Swarm Optimization for Random Cryptographic Key Generation
...Show More Authors

The biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
Aaps Pharmscitech
Nanosuspension-Based Repaglinide Fast-Dissolving Buccal Film for Dissolution Enhancement
...Show More Authors

Drug solubility and dissolution remain a significant challenge in pharmaceutical formulations. This study aimed to formulate and evaluate repanglinide (RPG) nanosuspension-based buccal fast-dissolving films (BDFs) for dissolution enhancement. RPG nanosuspension was prepared by the antisolvent-precipitation method using multiple hydrophilic polymers, including soluplus®, polyvinyl alcohol, polyvinyl pyrrolidine, poloxamers, and hydroxyl propyl methyl cellulose. The nanosuspension was then directly loaded into BDFs using the solvent casting technique. Twelve formulas were prepared with a particle size range of 81.6-1389 nm and PDI 0.002-1 for the different polymers. Nanosuspensions prepared with soluplus showed a favored mean particle size o

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2020
Journal Name
College Of Islamic Sciences
Arabization and its contemporary applications A jurisprudential study of the provisions and certifications of Arabization and migration
...Show More Authors

The place in which the person lives and his geographical and social environment have a great impact on building his personality, belief and culture, Islam has alerted the importance of the Muslim to make sure to choose the appropriate place in which he resides and dwells in that it is compatible with his religion and belief in order to ensure communication with Islamic knowledge in a way that enhances his belief Arabization occurs when a person makes himself an Arab by living the life of the Bedouins, and creates the morals of the Bedouins from the inhabitants of the Badia with its harshness, cruelty, ignorance and lack of understanding in religion and far from the sources of knowledge of Islamic knowledge. Blasphemy and polytheism, and

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 08 2021
Journal Name
Egyptian Journal Of Chemistry
Synthesis And Characterization Of Metal(II) Complexes With Azo Dye Ligand And Their Industrial And Biological Applications
...Show More Authors

Azo ligand 4-((2-hydroxy-3,5-dimethylphenyl)diazenyl) benzoic acid was synthesized from 4-aminobenzoic acid and 2,4- dimethylphenol. Azo dye compounds have been characterized by different techniques (1H-NMR, UV-Vis and FT-IR). Metal chelates of (ZnII, CdII and HgII) have been synthesized with azo ligand (L). Produced compounds have been identified by using spectral studies, elemental analysis(C.H.N.) and conductivity. Produced metal chelates were studied using mole ratio as well sequences contrast types. Rate of concentration(1×10-4-3×10-4 Mole/L) sequence Beer's law. Compound solutions have been noticed height molar absorptivity. The addendum of ligand and compounds has applied as disperse dyes on cotton fabrics for antibacterial activit

... Show More
Preview PDF