Preferred Language
Articles
/
IRiJYJQBVTCNdQwCPRTH
Transmission Of 10 Gb/s For Underwater Optical Wireless Communication System
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Mon May 28 2018
Journal Name
Iraqi Journal Of Science
Hide Secret Messages in Raster Images for Transmission to Satellites using a 2-D Wavelet Packet
...Show More Authors

     The hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Pressure Control of Electro-Hydraulic Servovalve and Transmission Line Effect
...Show More Authors

The effected of the long transmission line (TL) between the actuator and the hydraulic control valve sometimes essentials. The study is concerned with modeling the TL which carries the oil from the electro-hydraulic servovalve to the actuator. The pressure value inside the TL has been controlled by the electro-hydraulic servovalve as a voltage supplied to the servovalve amplifier. The flow rate through the TL has been simulated by using the lumped π element electrical analogy method for laminar flow. The control voltage supplied to servovalve can be achieved by the direct using of the voltage function generator or indirect C++ program connected to the DAP-view program built in the DAP-card data acqu

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Economic Analysis for Construction in Ibn Khalduon s’ Muqaddimah
...Show More Authors

The specialist researcher  fined the relations between economic ideas with economic facts in his theory which called humanity building it is appeared clearly ( in Ibn Khalduons’ Muqaddimah) in a clothe of economic  social  phenomenon's as a systematical analysis in all fifty chapters of al Muqaddimah ,therefore this paper deal with  Ibn Khalduon economic thoughts as important says which describe the society building in its economic subjective  and  examine the relationship between The dissert and the city within economic says which are cover  the social analysis ,and determinate   the analysis objects  which clearly in this dualism  model ,between the state and economic bas

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
β- catenin Expression and Its Relation to Bryne’s Invasive Grading System in Oral Squamous Cell Carcinoma
...Show More Authors

Background: Invasion in oral cancer involves alterations in cell-cell and cell-matrix interactions that accompanied by loss of cell adhesion. Catenins stabilize cellular adherence junctions by binding to E-cadherin, which further mediates cell-cell adhesion and regulates proliferation and differentiation of epithelial cells. The Wnt/β-catenin pathway is one of the major signaling pathways in cell proliferation, oncogenesis, and epithelial-mesenchymal transition. Aims of the study: to detect immunohistochemical distribution pattern and different subcellular localization of β-catenin in oral squamous cell carcinoma and relate such expression to Bryne’s invasive grading system. Materials and Methods: This study included 30 paraffi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Lecture Notes In Computer Science
Constrained Differential Evolution for Cost and Energy Efficiency Optimization in 5G Wireless Networks
...Show More Authors

The majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
information and communication technologies and their impact on changed the financial reporting system In a Sample in Iraqi banks
...Show More Authors

paid recent developments in the information and communications technology and the accompanying developments in the global market to pay particular accounting information users to demand more sophistication in terms of corporate financial reporting systems, which led to the emergence of a new type of reporting (financial reporting in real time). where is the information and communications technology mainstay Nations for the development and progress, thanks to the development of technology that have made the transmission of information easily conducted and high speed to all who need it, communication is instantaneous and the flow of information via the internet dramatically exceeded the border temporal and spatial anywhere in the w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Computer Networks And Wireless Communications
Performance Analysis of VoIP in Wireless Networks
...Show More Authors

Voice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator

... Show More
View Publication
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Constraction scale of communication Apprehetion
...Show More Authors

          The research aims to build a communication apprehention scale for student (females) from preparatory schools .research sample included (400)students (females) were selected from the preparatory . to build a tool for the researchers are several steps , todetermine the meaning of communication apprehention and formulation of the items of the seale according to the linkert method .

View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
A Secured End to End Voice Transmission in Smartphone
...Show More Authors

The traditional voice call over Global System for Mobile Communications (GSM) and Public Switched Telephone Network (PSTN) is expensive and does not provide a secure end to end voice transmission. However, the growth in telecommunication industry has offered a new way to transmit voice over public network such as internet in a cheap and more flexible way. Due to insecure nature of the public network, the voice call becomes vulnerable to attacks such as eavesdropping and call hijacking. Accordingly, protection of voice call from illegal listening becomes increasingly important.
To this end, an android-based application (named E2ESeVoice application) to transmit voice in a secure way between the end users is proposed based on modified R

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
A novel fusion-based approach for the classification of packets in wireless body area networks
...Show More Authors

This abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota

... Show More
View Publication
Scopus Crossref