Preferred Language
Articles
/
9BbnGYcBVTCNdQwCIzY3
A Resource Allocation Mechanism for Cloud Radio Access Network Based on Cell Differentiation and Integration Concept
...Show More Authors

Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The effect of the Iraqi dinar exchange rate on inflation and economic growth using the joint integration methodology "a standard study"
...Show More Authors

The exchange rate is of great importance at the global and local levels alike, as this importance increases with the increasing rates of development of economic relations between countries of the world due to openness and integration into the global economy, expressed by the expansion of the volume of trade and financial relations between countries. The Central Bank of Iraq has set the need to stabilize this price as a goal to reduce inflation rates and reduce them to the internationally accepted rates by using the foreign currency sale window to achieve a balance between the forces of supply and demand for foreign currency and to preserve the value of the Iraqi dinar. The research concluded that the central bank was It has a maj

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 11 2025
Journal Name
Al–bahith Al–a'alami
Conflict and Integration between New and Traditional Media
...Show More Authors

The new media scene reveals that the unprecedented overlap of a number of technical, economic, and political factors has made the new media a very complicated issue; and the focus of specialized and public debates about its impact on traditional means of communication and forms of social media and social relations. Then, the same scene discloses the reality of the relationship between the new and the traditional. These are the axes that will be will be discussed in this study.

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Identification Pseudomonas aeruginosa by 16s rRNA gene for Differentiation from Other Pseudomonas Species that isolated from Patients and environment
...Show More Authors

Pseudomonas aeruginosa is a common and major opportunistic human pathogen, its causes many and dangersinfectious diseases due to death in some timesex: cystic fibrosis , wounds inflammation , burns inflammation , urinary tract infection , other many infections otitis external , Endocarditis , nosocomial infection and also causes other blood infections (Bacteremia). thereforebecomes founding fast and exact identification of P. aeruginosafrom samples culture very important.However, identification of this species may be problematic due to the marked phenotypic variabilitydemonstrated by samples isolates and the presence of other closely related species. To facilitate species identification, we used 16S ribosomal DNA(rRNA) sequence data

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Effect of Pb dopant On A.C mechanism of ZnS thin films
...Show More Authors

Vacuum evaporation technique was used to prepare pure and doped ZnS:Pb thin films at10% atomic weight of Pb element onto glass substrates at room temperature for 200 nm thickness. Effect of doping on a.c electrical properties such as, a.c conductivity, real, and imaginary parts of dielectric constant within frequency range (10 KHz - 10 MHz) are measured. The frequency dependence of a.c conductivity is matched with correlated barrier hoping especially at higher frequency. Effect of doping on behavior of a.c mechanism within temperature range 298-473 K was studied.

View Publication Preview PDF
Crossref