Preferred Language
Articles
/
6xedMI8BVTCNdQwCy19w
Periodontal health status for post-menopausal women with and without osteoporosis (Clinical and radiographical study)
...Show More Authors

Scopus
Publication Date
Wed Nov 24 2021
Journal Name
2021 Ieee Asia Pacific Conference On Postgraduate Research In Microelectronics And Electronics (primeasia)
Review of 3D Networks-On-Chip Simulators and Plugins
...Show More Authors

A comprehensive review focuses on 3D network-on-chip (NoC) simulators and plugins while paying attention to the 2D simulators as the baseline is presented. Discussions include the programming languages, installation configuration, platforms and operating systems for the respective simulators. In addition, the simulator’s properties and plugins for design metrics evaluations are addressed. This review is intended for the early career researchers starting in 3D NoC, offering selection guidelines on the right tools for the targeted NoC architecture, design, and requirements.

View Publication
Scopus (13)
Crossref (13)
Scopus Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (64)
Crossref (57)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Sep 11 2022
Journal Name
Concurrency And Computation: Practice And Experience
Fast and accurate computation of high‐order Tchebichef polynomials
...Show More Authors

View Publication
Scopus (29)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Academy Of Accounting And Financial Studies Journal
Organizational performance in Iraqi SMEs: Validity and reliability questionnaire
...Show More Authors

View Publication
Scopus (9)
Scopus
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Diabetic Patients Knowledge and Practice Regarding Annual Visual Checking
...Show More Authors

Background: Diabetes mellitus (DM) is a significant cause of visual impairment; many diabetics do not have regular eye examinations, although it is known that early diagnosis and reduces the risk of blindness. There were many barriers that prevent diabetics from attending eye clinics.

Objectives: To assess knowledge, and practice about ocular complications among diabetic patients and to determine barriers preventing the diabetic patients annual visual checking

Methods: A cross-sectional study involving the interview was conducted among 300 diabetic patients attending out patient in Ibn Al Haitham Teaching Ophthalmology Hospital between November 2017 and June 2018.

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Pilot Based Channel Estimation and Synchronization in OFDM System
...Show More Authors

Channel estimation and synchronization are considered the most challenging issues in Orthogonal Frequency Division Multiplexing (OFDM) system. OFDM is highly affected by synchronization errors that cause reduction in subcarriers orthogonality, leading to significant performance degradation. The synchronization errors cause two issues: Symbol Time Offset (STO), which produces inter symbol interference (ISI) and Carrier Frequency Offset (CFO), which results in inter carrier interference (ICI). The aim of the research is to simulate Comb type pilot based channel estimation for OFDM system showing the effect of pilot numbers on the channel estimation performance and propose a modified estimation method for STO with less numb

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (11)
Crossref (11)
Scopus Crossref
Publication Date
Tue Mar 10 2020
Journal Name
Open Access Macedonian Journal Of Medical Sciences
Maternal Anemia Prevalence and Subsequent Neonatal Complications in Iraq
...Show More Authors

BACKGROUND: Anemia during pregnancy is still a challenge throughout the world, and it may cause severe health consequences in the maternal and fetal sides. AIM: This study aims to find out the prevalence of maternal anemia and potential adverse outcomes in Iraq. METHODS: In Medical City Tertiary Center in Baghdad, singleton pregnant ladies came for delivery were involved over 6 months’ period. Based on hemoglobin (Hb) readings; they were divided into no anemia group (Hb>11 g/l) and anemia group which were further subdivided into mild, moderate, and severe (Hb =10–10.9, =7.1–9.9, and <7 g/l, respectively). Full history and examination were performed by attending obstetrician and pediatrician for the upcoming b

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref