Preferred Language
Articles
/
RhbwtokBVTCNdQwC_YxF
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 02 1999
Journal Name
Iraqi Journal Of Science
A new proposal method for sampling and explosion of the phosphatic rocks in the Akkashat Mine, Western desert, Iraq
...Show More Authors

Publication Date
Fri Nov 11 2011
Journal Name
Thesis
Performance Analysis of a New Compact Magneto-Rheological Proportional Control Valve for Hydraulic Actuation Using FEM and Experimental Approach
...Show More Authors

One of the main parts in hydraulic system is directional control valve, which is needed in order to operate hydraulic actuator. Practically, a conventional directional control valve has complex construction and moving parts, such as spool. Alternatively, a proposed Magneto-rheological (MR) directional control valve can offer a better solution without any moving parts by means of MR fluid. MR fluid consists of stable suspension of micro-sized magnetic particles dispersed in carrier medium like hydrocarbon oil. The main objectives of this present research are to design a MR directional control valve using MR fluid, to analyse its magnetic circuit using FEMM software, and to study and simulate the performance of this valve. In this research, a

... Show More
Publication Date
Sat Sep 01 2012
Journal Name
2012 8th International Conference On Wireless Communications, Networking And Mobile Computing
Performance Evaluation of Location Management in GSM Networks
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Topological Indices Polynomials of Domination David Derived Networks
...Show More Authors

The chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s

... Show More
View Publication
Scopus (43)
Crossref (20)
Scopus Crossref
Publication Date
Tue Apr 16 2024
Journal Name
Ecancermedicalscience
Prostate cancer across four countries in the Middle East: a multi-centre, observational, retrospective and prognostic study
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Engineering
Calculating Production Rate of each Branch of a Multilateral Well Using Multi-Segment Well Model: Field Example
...Show More Authors

Multilateral wells require a sophisticated type of well model to be applied in reservoir simulators to represent them. The model must be able to determine the flow rate of each fluid and the pressure throughout the well. The production rate calculations are very important because they give an indication about some main issues associated with multi-lateral wells such as one branch may produce water or gas before others, no production rate from one branch, and selecting the best location of a new branch for development process easily.                                &nbsp

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Calculating the Transport Density Index from Some of the Productivity Indicators for Railway Lines by Using Neural Networks
...Show More Authors

The efficiency evaluation of the railway lines performance is done through a set of indicators and criteria, the most important are transport density, the productivity of enrollee, passenger vehicle production, the productivity of freight wagon, and the productivity of locomotives. This study includes an attempt to calculate the most important of these indicators which transport density index from productivity during the four indicators, using artificial neural network technology. Two neural networks software are used in this study, (Simulnet) and (Neuframe), the results of second program has been adopted. Training results and test to the neural network data used in the study, which are obtained from the international in

... Show More
View Publication Preview PDF