Preferred Language
Articles
/
BoblQoYBIXToZYALiYHp
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive number of antenna elements to improve both spectral efficiency and energy efficiency. On the other hand, the second research method (PD-NOMA) allows multiple non-orthogonal signals to share the same orthogonal resources by allocating different power level for each station. PD-NOMA has a better spectral efficiency over the orthogonal multiple access methods. A review of previous works regarding the MAC design for different wireless networks is classified based on different categories. The main contribution of this research work is to show the importance of the MAC design with added optimal functionalities to improve the spectral and energy efficiencies of the wireless networks.</span></p>

Crossref
Publication Date
Mon Apr 01 2013
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Effect of Recruitment Maneuvers on Oxygen Saturation, End Tidal Carbon Dioxide and Lung Mechanics in Pressure Control Ventilation Versus Volume Control Ventilation for Patient Undergoing Laparoscopic Sleeve Gastrectomy
...Show More Authors

Background: Atelectasis occurs regularly after induction of general anesthesia in bariatric surgery, persists postoperatively, and may contribute to significant postoperative morbidity. Intraoperative recruitment maneuver improve lung ventilation, oxygenation and lung mechanics.

Objectives: The aim of this study was to compare the effects of recruitment maneuver on oxygen saturation, end tidal carbon dioxide and lung mechanics in two Groups; the volume control group and pressure control group with fixed level of PEEP.

Patient and Method:  Forty patients, BMI >35 kg/ m2, who have no major obstructive or restrictive respiratory disorders where allocated in two group

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 13 2023
Journal Name
Iraqi Journal Of Architecture And Planning
Geospatial Techniques for Preparing the Requirements of 3D Modeling for Smart City Planning- Review paper
...Show More Authors

Developing smart city planning requires integrating various techniques, including geospatial techniques, building information models (BIM), information and communication technology (ICT), and artificial intelligence, for instance, three-dimensional (3D) building models, in enabling smart city applications. This study aims to comprehensively analyze the role and significance of geospatial techniques in smart city planning and implementation. The literature review encompasses (74) studies from diverse databases, examining relevant solutions and prototypes related to smart city planning. The focus highlights the requirements and preparation of geospatial techniques to support the transition to a smart city. The paper explores various aspects,

... Show More
View Publication
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Private Financial Institutions and their Role in the Development of Small and Medium sized Enterprises in Iraq
...Show More Authors

the reality of small and medium enterprises analysis reflects weaknesses plaguing these enterprises and strengths that are characterized by, and thus the formulation of appropriate solutions to the obstacles faced by these enterprises to enhance its contribution to the achievement of economic and social development. Iraqi small and medium enterprises suffer from several obstacles stand in front of development and  support their competitiveness, the finance one of the main obstacles which impede growth and development of these enterprises, noting the banking system in Iraq reluctance to lend to small and medium-sized enterprises, as a result of the high cost of lending these enterprises compared to large projects, as well as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Subject Review on a Some Analytical Methods for the Determination of Chloroquine and Hydroxychloroquine Drugs
...Show More Authors

Chloroquine and Hydroxychloroquine drugs are widely prescribed for malaria disease. Since the end of 2019, humans have been under threat due to a disease called (COVID-19), which was first reported in China. Many methodical approaches have been reported to quantify chloroquine and hydroxychloroquine in blood, urine, plasma, serum, and pharmaceutical dosage form. Some of these techniques are spectrophotometry, liquid chromatography with a mass detector, gas chromatography, and ultra-performance, high-performance liquid chromatography (HPLC), in addition to electrochemical methods. This literature review discusses various analytical methods for the determining hydroxychloroquine and chloroquine.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall

... Show More
View Publication Preview PDF
Scopus (27)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Aug 30 2018
Journal Name
Iraqi Journal Of Science
Towards Generating Robust Key Based on Neural Networks and Chaos Theory
...Show More Authors

There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.

View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
N – Topological Space and Its Applications in Artificial Neural Networks
...Show More Authors

   In this paper we give definitions, properties and examples of the notion of  type Ntopological space. Throughout this paper  N is a finite positive  number, N 2. The task of this paper is to study and investigate some properties of such spaces with the existence of a relation between this space and artificial Neural Networks (NN'S), that is we applied the definition of this space in computer field and specially in parallel processing

View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Monitoring and Quality Control of Stud Welding
...Show More Authors

This study is conducted to carry out a straightforward way appropriate for quality monitoring and stability of arc stud welding process, followed by a number of procedures to control the quality of welded samples, namely torque destructive testing and visual inspection context.  Those procedures were being performed to support the monitoring system and verify its validity. Thus, continuous on-line monitoring guarantees earlier discovering stud welding defects and avoiding weld repeatability. On-line welding electronic monitoring system is for non destructive determining if a just completed weld is satisfactory or unsatisfactory, depending on welding current peak value detected by the system. Also, it has been observed significant ha

... Show More
View Publication Preview PDF