Preferred Language
Articles
/
ORYoqYcBVTCNdQwC2lrN
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and solve the problem of accumulation, collection and analysis of data by storing it with large, expanded and automatically interconnected databases between university places and departments to provide services adapted to the desire of demand. This research dealt with a sample from of the academic’s opinions and students. The sample is 319 questionnaires. It concluded that each of the infrastructure, devices, Internet of things, smart classrooms, and administrative database, with the presence of the fifth-generation network and its equipment, have a statistically significant correlation with technical education technology.

Scopus Crossref
View Publication
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Simple 2D chaotic remapping scheme for securing optical communication networks
...Show More Authors

In this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the  BE

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Some K-Banhatti Polynomials of First Dominating David Derived Networks
...Show More Authors

Chemical compounds, characteristics, and molecular structures are inevitably connected. Topological indices are numerical values connected with chemical molecular graphs that contribute to understanding a chemical compounds physical qualities, chemical reactivity, and biological activity. In this study, we have obtained some topological properties of the first dominating David derived (DDD) networks and computed several K-Banhatti polynomials of the first type of DDD.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks
...Show More Authors

Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the  Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co

... Show More
Scopus (43)
Crossref (21)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Health Education And Health Promotion
Effectiveness of an Educational Program on Nannies' Practice Regarding Cholera Infection in the Nurseries
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sun Jul 03 2011
Journal Name
Journal Of Educational And Psychological Researches
Educational activities in the role of government nurseries and its relationship to some variables
...Show More Authors

The skill of management educational activities gradually grow with the experience, but they differ from personal skill educator to another, because each style nanny personally and the way to work. There educator and active movement and vitality that look like happiness and clear during the implementation of the activity, and the other runs educational activities quietly, efficiently and without emotion and clear (dry, 2001: p. 274). And the stage of childhood is one of the most important stages that are based upon the future life as a whole because the man also confirmed by the School of analysis psychological is the son of his childhood and the best example to us what the Holy Prophet Muhammad (peace be upon him): (Every child i

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Image Processing of A Fabry -Perot Interferometer to Determine the Defects of Leneses by Using He-Ne Laser
...Show More Authors

A design of a Fabry -Perot  interferometer system was constructed

to determine the precise value of the wavelength which is required in spectml studies depending on varying medium pressure where the refractive  index  was a  function  of  pressure  at  a  constant  distance between  the  two  mirrors by  using a Hc-Ne  laser (632.8)  tun as  a coherent source .

The (fmee) (t) and the coefficient of finesses (F) and the visbility

of the fringes (V) has been calculated  . Image processing \\•as used and   its  result   can   be   relied   on   verifying&nbsp

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Estimation of Bladder pressure by using poiseuilles equation
...Show More Authors

Equation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy

View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF