Preferred Language
Articles
/
OhfuQ48BVTCNdQwCLmgq
Automatic Iraqi license plate recognition system using back propagation neural network (BPNN)
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of The Mechanical Behavior Of Materials
Simulation and assessment of water supply network for specified districts at Najaf Governorate
...Show More Authors
Abstract<p>This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand </p> ... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2003
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
OCCURRENCE OF SOME FISH PARASITES IN AL-MADAEN DRAINAGE NETWORK, SOUTH OF BAGHDAD
...Show More Authors

Seven fish species were collected from the drainage network at Al-Madaen region, south of
Baghdad with the aid of a cast net during the period from March to August 1993. These fishes
were infected with 22 parasite species (seven sporozoans, three ciliated protozoans, seven
monogeneans, two nematodes, one acanthocephalan and two crustaceans) and one fungus
species. Among such parasites, Chloromyxum wardi and Cystidicola sp. are reported here for
the first time in Iraq. In addition, 11 new host records are added to the list of parasites of
fishes of Iraq.

View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
The indexing of the Al-Kindy College Medical Journal in the Scopus Database Journals: A Fundamental Step toward an International Recognition
...Show More Authors

On Saturday, May 13, 2023, a glorious day was engraved in the history of Al-Kindy College Medical Journal as it is the day of indexing the journal in the Scopus Database Journals. The journal has paced a strenuous journey to make that achievement.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu May 31 2018
Journal Name
International Journal Of Control And Automation
Power Flow Control of Iraqi International Super Grid with Two-Terminal HVDC Techniques Using PSS/E
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Assessing Service Quality using Data Envelopment analysis Case study at the Iraqi Middle East Investment Bank
...Show More Authors

The use of data envelopment analysis method helps to improve the performance of organizations in order to exploit their resources efficiently in order to improve the service quality. represented study a problem in need of the Iraqi Middle East Investment Bank to assess the performance of bank branches, according to the service quality provided, Thus, the importance of the study is to contribute using a scientific and systematic method by applying  the data envelopment analysis method in assessing the service quality provided by the bank branches, The study focused on achieving the goal of determining the efficiency of the  services quality provided by the bank branches manner which reflect the extent of utilization of a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 14 2016
Journal Name
International Journal For Sciences And Technology
Evaluation of her/2-neu gene status using FISH/CISH techniques in Iraqi breast carcinoma patients
...Show More Authors

The present study aimed to examine the concordance between FISH/CISH techniques for assessment of amplification of her2neu gene in Iraqi breast carcinoma patients. Seventy four (74) Iraqi breast cancer patients were involved at the study from the Histopathology Department at the Central Public Health Laboratory in Bagdad, Iraq. Amplification of HER2neu was detected in (33.8%) by fluorescence in situ hybridization and (13.51%) showed high amplification by chromogenic in situ hybridization and (32.43%) showed low amplification. The results of chromogenic in situ hybridization were significantly correlated with the results of two-color fluorescence in situ hybridization with the same tumors. In addition, the study involved the correlation betw

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Plant Archives
Spatial distribution of some fertility elements in some northern Iraqi soils using geomatic techniques (remote sensing)
...Show More Authors

Scopus