Preferred Language
Articles
/
ARbpGYcBVTCNdQwCZTfG
An Interference Mitigation Scheme for Millimetre Wave Heterogeneous Cloud Radio Access Network with Dynamic RRH Clustering
...Show More Authors

Crossref
View Publication
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Wed Feb 16 2022
Journal Name
Journal Of Economics And Administrative Sciences
Solving Resource Allocation Model by Using Dynamic Optimization Technique for Al-Raji Group Companies for Soft Drinks and Juices
...Show More Authors

In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
Obstacles to women's access to the positions of leadership in the university from their point of view
...Show More Authors

The problem of research is the need to find out the obstacles and difficulties facing women in accessing leadership positions at the University of Baghdad from their point of view. The importance of research comes from the importance of women in the university and their vital role in the development of society. The research objectives summarized the most important obstacles facing women Access to the leadership positions in the university and the relative weight of these obstacles as well as trying to identify differences in their view of these obstacles according to the variables of specialization (scientific, human) and the scientific title (Professor, Assistant Professor, Teacher, Assistant Lecturer). They were (144) university female

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Wave Propagation in Detection of Aorta Dieses Using Lumps Analysis
...Show More Authors

In this paper a theoretical attempt is made to determine whether changes in the aorta diameter at different location along the aorta can be detected by brachial artery measurement.  The aorta is divided into six main parts, each part with 4 lumps of 0.018m length. It is assumed that a desired section of the aorta has a radius change of 100,200, 500%. The results show that there is a significant change for part 2 (lumps 5-8) from the other parts. This indicates that the nearest position to the artery gives the significant change in the artery wave pressure while other parts of the aorta have a small effect.

View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
International Photonics And Optoelectronics
Canonical Logic Units using Bidirectional Four-Wave Mixing in Highly Nonlinear Fiber
...Show More Authors

All-optical canonical logic units at 40 Gb/s using bidirectional four-wave mixing (FWM) in highly nonlinear fiber are proposed and experimentally demonstrated. Clear temporal waveforms and correct pattern streams are successfully observed in the experiment. This scheme can reduce the amount of nonlinear devices and enlarge the computing capacity compared with general ones. The numerical simulations are made to analyze the relationship between the FWM efficiency and the position of two interactional signals. © 2015 Chinese Laser Press

View Publication
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 37th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Wave speed and reflections proximal to aneurism and stenosis of flexible tubes
...Show More Authors

Arterial aneurism and stenosis are disorders that lead to circulation malfunction. Stenosis often leads to hypoxia of the organ depending on the affected artery, whilst aneurism can lead to dissection with known lethal consequences. On both cases, the pulse wave produced by the contracting heart is reflected at these discontinuities, and estimating the size of these reflected waves using wave intensity analysis (WIA) is the main aim of this work. We also aim to measure wave speed, or pulse wave velocity (PWV) as more commonly known within the discontinuities. We manufactured 4 stenosis and 4 aneurism silicon sections, connected one at a time to a mother tube, and tested in vitro. Pressure and flow were measured proximal to the discontinuity

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 11 2019
Journal Name
Aip Conference Proceedings
Estimation of shock wave position in plasma plume using Sedov-Taylor model
...Show More Authors

In this work, radius of shock wave of plasma plume (R) and speed of plasma (U) have been calculated theoretically using Matlab program.

Publication Date
Wed Dec 29 2021
Journal Name
Al-khwarizmi Engineering Journal
Comparison of Prediction Programs for Short Wave Circuit Link from Iraq to Test points on Both Earth Hemispheres during Solar Minimum
...Show More Authors

This paper compare  the accurecy of HF propagation  prediction programs for  HF circuits links between Iraq and  different points world wide  during August 2018 when  solar cycle 24 (start 2009 end 2020) is at minimun activity and also find out the best communication mode  used. The prediction   programs like Voice of America Coverage Analysis Program (VOACAP) and ITU Recommendation RS 533 (REC533 )  had been used to generat HF circuit link  parameters like Maximum Usable Frequency ( MUF) and Frequency of Transsmision (FOT) .Depending  on the predicted parameters (data)  , real radio contacts had been done using a radio transceiver from Icom  model IC 7100 with 100W RF

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref