Preferred Language
Articles
/
VRf3kI8BVTCNdQwCgHvV
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial time by using the Benders decomposition technique and cutting plane approximation. To ensure the nonincreasing character of the Benders upper limit, a local branching method was also added to improve the convergence. Simulation results indicated that the proposed method is superior to the existing method and has better overall performance.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)
...Show More Authors

      Big data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 31 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Invariant Moments Based With Wavelet Used To Decide the Authintication and Originality of Images
...Show More Authors

 The digital image with  the wavelet tools  is increasing nowadays with MATLAB library, by using  this method based on invariant moments which are  a set of seven moments can be derived from the second and third moments , which can be calculated after converting the image from colored map to gray scale , rescale the image to (512 * 512 ) pixel , dividing the image in to four equal pieces (256 * 256 ) for each piece , then for gray scale image  ( 512 * 512 ) and the four pieces (256 * 256  ) calculate  wavelet with moment and invariant moment, then  store  the result with the author ,owner for this image to build data base for the original image to decide the authority of these images by u

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2023
Journal Name
Iraqi Journal Of Science
Investigation of Sn(IV) and Sn(II) by dianionicligand compounds Supported by Nitrogen-Based Ligands
...Show More Authors

Synthetic routes to a series of tin compounds incorporating nitrogen-based
chelating ligands are described. The β-diketiminato tin chloride precursor was
utilized to isolate the first tin-phosphorus tin compound using this ligand,
[(HC{C(Me)NAr}2)SnPPh2]. A diamide ligand was employed to investigate tin (II)
and (IV) compounds. Two tin (II) and (IV) compounds, [(Me2Si{ArN}2)SnPh2] and
[Li(OEt)2](Me2Si{ArN}2)SnPh2], were formed via reaction of the lithiated
preligand, [Me2Si{ArNLi}2]+Sn(IV). Finally a novel Sn(II) N-heterocyclic
stannylene compound was formed by reaction of the preligand with SnCl4.
The diamide ligand was found to be suitable for both Sn(IV) and Sn(II)
compounds. Reaction to obtain the tin dich

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2023
Journal Name
Farmacia
LASMIDITAN NANOEMULSION BASED IN SITU GEL INTRANASAL DOSAGE FORM: FORMULATION, CHARACTERIZATION AND IN VIVO STUDY
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue May 03 2022
Journal Name
Teikyo Medical Journal
Tooth agenesis and palatal dimensions associated with craniofacial deformity- Cone Beam Computed Tomography based study
...Show More Authors

Cleft / palate is one of the common congenital deformities in craniofacial region, associated with different types of dental anomalies like (Tooth agenesis, impaction, and supernumerary teeth) with marked changes in palatal dimensions. This study aimed to determine the prevalence of teeth agenesis and dental anomalies in cleft lip/palate patients using CBCT, and to compare the palatal dimension of cleft group with control subjects. Twenty-eight cleft cases collected during the period from 2015 to 2022, CBCT images evaluated, the study sample classified into two groups (14 bilateral and 14 unilateral cleft lip/palate) and the non-cleft control group (14 CBCT images). The presence of dental anomalies was assessed in relation to clef

... Show More
Publication Date
Thu Jun 26 2014
Journal Name
Engineering Optimization
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
Localization of the Optic Disc in Retinal Fundus Image using Appearance Based Method andVasculature Convergence
...Show More Authors

Optic Disc (OD) localization is a basic step for the screening, identification and appreciation of the risk of diverse ophthalmic pathologies such as glaucoma and diabetic retinopathy.In fact, the fundamental step towards an exact OD segmentation process is the success of OD localization. This paper proposes a fully automatic procedure for OD localization based on two of the OD most relevant features  of high-intensity value and vasculature convergence. Merging ofthese two features renders the proposed method capable of localizing the OD within the variously complicated environments such as the faint disc boundary, unbalanced shading, and the existence of retinal pathologies like cotton wall and exudates,which usually share the same

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
Constructing Imminent Carcinogenic Attack in English and Arabic Scientific Discourse: A Corpus-Based Contrastive Study
...Show More Authors

Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Studies In Big Data
COVID-19 Diagnostics from the Chest X-Ray Image Using Corner-Based Weber Local Descriptor
...Show More Authors

Corona Virus Disease-2019 (COVID-19) is a novel virus belongs to the corona virus's family. It spreads very quickly and causes many deaths around the world. The early diagnosis of the disease can help in providing the proper therapy and saving the humans' life. However, it founded that the diagnosis of chest radiography can give an indicator of coronavirus. Thus, a Corner-based Weber Local Descriptor (CWLD) for COVID-19 diagnostics based on chest X-Ray image analysis is presented in this article. The histogram of Weber differential excitation and gradient orientation of the local regions surrounding points of interest are proposed to represent the patterns of the chest X-Ray image. Support Vector Machine (SVM) and Deep Belief Network (DBN)

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref