Preferred Language
Articles
/
Yhf4N48BVTCNdQwC02Or
Bio-inspired multi-objective algorithms for connected set K-covers problem in wireless sensor networks
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Fri Dec 20 2019
Journal Name
Iet Circuits, Devices & Systems
Multi‐bit error control coding with limited correction for high‐performance and energy‐efficient network on chip
...Show More Authors

In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Calculating the Transport Density Index from Some of the Productivity Indicators for Railway Lines by Using Neural Networks
...Show More Authors

The efficiency evaluation of the railway lines performance is done through a set of indicators and criteria, the most important are transport density, the productivity of enrollee, passenger vehicle production, the productivity of freight wagon, and the productivity of locomotives. This study includes an attempt to calculate the most important of these indicators which transport density index from productivity during the four indicators, using artificial neural network technology. Two neural networks software are used in this study, (Simulnet) and (Neuframe), the results of second program has been adopted. Training results and test to the neural network data used in the study, which are obtained from the international in

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Network And Computer Applications
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
...Show More Authors

View Publication
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Feb 26 2022
Journal Name
Sport Tk-revista Euroamericana De Ciencias Del Deporte
Effect of physical exertion training on bio-kinetic abilities in weightlifting among students of Physical Education and Sports Sciences
...Show More Authors

The objective of this research was to study the effect of physical exertion training on bio-kinetic abilities in weightlifting among students of Physical Education and Sports Sciences. The present study had a pre-posttest experimental design in which participants were recruited in two groups: experimental group and control group. A total of 30 students of Physical Education and Sports Sciences constituted the sample of the study. The sample selection was done by a comprehensive inventory method. Participants were equally allocated into two groups with n=15 in each group. Participants of experimental group were made to perform special physical exercises with three training units per week during eight weeks. The statisti

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 31 2008
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bio Chemical Study of Antithyroid Peroxidase Auto Antibodies , Magnesium and Cobalt in Hyperthyroidism Patients From Different Regions of Iraq.
...Show More Authors

Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Attitudes and prayers Ahl al-Bayt peace be upon them to poets In the Umayyad and Abbasid periods Objective study
...Show More Authors

Poetry occupied the Arabs in a unique position, especially in the era; ignorant, Umayyad and Abbasid, in addition to its literary and aesthetic dimensions, it is at the forefront of tools and media at the time. The poet appointed society and poetry Diwan Arabs records their exploits and virtues and their valor in the wars... The Prophet Muhammad () realized the importance of poetry, so he took advantage of him in the libel for his Islamic call. In the Umayyad and Abbasid states, poetry had a clear role in social, literary and political life, as the ruling authority used its influence on many poets to be media to support its political theory, by praising the Caliph and his aides, and exposing those who dissented and opposing them. The

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Adoption of multi – model Assignment Fuzzy to find Optimizing for the use of internet line in the Ministry of Science and Technlogy
...Show More Authors

We have provided in this research model multi assignment  with  fuzzy function goal has been to build programming model is correct Integer Programming fogging  after removing the case from the objective function data and convert it to real data .Pascal triangular graded mean using Pascal way to the center of the triangular.

The data processing to get rid of the case fogging which is surrounded by using an Excel 2007 either model multi assignment  has been used program LNDO to reach the optimal solution, which represents less than what can be from time to accomplish a number of tasks by the number of employees on the specific amount of the Internet, also included a search on some of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Applied probability model of inventory multi- period in stores of cement factory in Samawah
...Show More Authors

In this paper will be applied to a probability model of inventories periods of multiple stores of raw materials used in the cement industry, cement factory in Samawah and basic materials are limestone, soil normal, iron soil, fuel oil and gypsum. It was built of this model after the test and determine the distribution of demand during the supply period (waiting period) for each subject and independently of the rest of the material as it is not affected by any of the materials above interrelated in the process of supply, this test has been using the Statistical Package of (SPSS) and then was determining the amount of request optimum seeking in each batch and each substance known volume of economic optimization of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More