Preferred Language
Articles
/
YRa5BYcBVTCNdQwCWy-o
Wireless Indoor Localization Systems and Techniques: Survey and Comparative Study
...Show More Authors

<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to have a good understanding of state of the art technologies and motivate new research efforts in this promising direction. For these reasons, existing wireless localization position systems and location estimation schemes are reviewed. We also made a comparison among the related techniques and systems along with conclusions and future trends to identify some possible areas of enhancements. </p>

Scopus Crossref
View Publication
Publication Date
Sun Dec 21 2025
Journal Name
Al-anbar University Journal Of Law And Political Sciences
The Effect of E-Government on Public Facility Management Methods (Comparative Study)
...Show More Authors

View Publication
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Juridical And Political Science
Civil Liability Arising from Children Abuse. A Comparative Study of American Law
...Show More Authors

Researchers are interested in the issue of children abuse and they look for its cause in the past and present. Their interest is limited to identifying penal liability which is caused by children abuse away from focusing on civil liability. So, the study is going to clarify the parents' responsibility for children abuse rather than civil liability of the medic in case he wouldn’t notify the authorities about the case according to the American law rules and the attitude of Iraqi law rather than some judicial application of civil cases that were exposed to American judiciary concerning children abuse.

View Publication
Crossref
Publication Date
Mon Jun 03 2019
Journal Name
Rawal Medical Journal
SUPERIOR VERSUS ANTERIOR PLATING OF MIDSHAFT CLAVICLE FRACTURE IN ADULT COMPARATIVE STUDY
...Show More Authors

Clavicle fractures are common injuries in young, active individuals. The majority of the fractures (80% to 85%) occur in the mid-shaft of the bone and account for approximately 2.6% of all fractures. For many years the standard treatment of fracture clavicle was the "figure-of-eight" bandage but several indications for operative fixation, the position of plate fixation for clavicle fracture remains controversial. The aim of this study is to compare between anterio—inferior and anterior-superior plating of mid-shaft displaced clavicle fracture in complications, plate prominence, nonunion, malunion and range of motion. This study is a prospective study conducted in Al-Kindy teaching hospital .A total of 30 patients with fracture mid –sh

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 29 2022
Journal Name
Research Journal Of Pharmacy And Technology
Rifampicin versus Doxycycline in Prevention of recurrent Boils (A Comparative Therapeutic Study)
...Show More Authors

Background: Suffering from recurrent boils (furunclosis) is a common problem in our locality as it is noticed by many dermatologists especially in association with increasingly hot weather. The most common causative organisms are staphylococci. Objective: The aim of the study was to shed the light upon this problem and compare two systemic therapeutic agents for the prevention of recurrence, doxycycline and rifampicin. Patient and method: One hundred thirty-five (135) Patients with recurrent boils from Al-Yarmouk teaching hospital dermatology outpatient department were included in this study; age ranged from 10 to 64 years old and out of total patients 32 were males and 103 were females. Patients were assessed by full history and cl

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Green Analytical Chemistry
Green methods for determination of paracetamol in drug samples: A comparative study
...Show More Authors

View Publication
Scopus (15)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Juridical And Political Science
Civil Liability Arising from Children Abuse. A Comparative Study of American Law
...Show More Authors

Researchers are interested in the issue of children abuse and they look for its cause in the past and present. Their interest is limited to identifying penal liability which is caused by children abuse away from focusing on civil liability. So, the study is going to clarify the parents' responsibility for children abuse rather than civil liability of the medic in case he wouldn’t notify the authorities about the case according to the American law rules and the attitude of Iraqi law rather than some judicial application of civil cases that were exposed to American judiciary concerning children abuse.

Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Working Memory Classification Enhancement of EEG Activity in Dementia: A Comparative Study
...Show More Authors

The purpose of the current investigation is to distinguish between working memory ( ) in five patients with vascular dementia ( ), fifteen post-stroke patients with mild cognitive impairment ( ), and fifteen healthy control individuals ( ) based on background electroencephalography (EEG) activity. The elimination of EEG artifacts using wavelet (WT) pre-processing denoising is demonstrated in this study. In the current study, spectral entropy ( ), permutation entropy ( ), and approximation entropy ( ) were all explored. To improve the  classification using the k-nearest neighbors ( NN) classifier scheme, a comparative study of using fuzzy neighbourhood preserving analysis with -decomposition ( ) as a dimensionality reduction technique an

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 21 2025
Journal Name
Iraq Journal Of Market Research And Consumer Protection
Study of the qualitative characteristics of oils derived from fish waste running Asian Silurus triostequs and use of organic solvents in certain food systems
...Show More Authors

View Publication
Publication Date
Wed Nov 03 2021
Journal Name
Al-ghary Journal Of Economic And Administrative Sciences
The Role of Marketing Vigilance in Analyzing the Strategic Position of Tourism Organization: A Survey Study of the Opinions of a Sample of Travel and Tourism Companies
...Show More Authors

The study aims at studying and analyzing the subject of marketing vigilance as it is one of the modern approaches in the marketing field that can be used to face changes in the competitive and strategic environment and that represents quick reactions on the part of the institution to ensure its survival and distinctiveness other aims are: Consolidating the strength of the marketing organization and its success continuously, represented by changes in the market share, awareness of the institution's position in the market and its relations with competing tourism companies, diversification of tourism services, as well as an analysis of the competitive strategic position of tourism institutions for the purpose of conducting a r

... Show More
View Publication
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref