Preferred Language
Articles
/
alkej-100
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP address among several different systems. In order to accomplish a secure channel to exchange data between two network devices, the Secure Shell (SSH) protocol was added.

The first test shows that the data transfer rate at different time intervals of the day found to be an average of 10.95 Kbps for uploading and 13.7 Kbps for downloading and the second test shows that the network performance improved when squid proxy cache was used. The data rate found to be 143.3 Kbps average for uploading rate and 376.6 Kbps average for downloading rate.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Intelligent Systems And Internet Of Things
Enhancing Convolutional Neural Network for Image Retrieval
...Show More Authors

With the continuous progress of image retrieval technology, the speed of searching for the required image from a large amount of image data has become an important issue. Convolutional neural networks (CNNs) have been used in image retrieval. However, many image retrieval systems based on CNNs have poor ability to express image features. Content-based Image Retrieval (CBIR) is a method of finding desired images from image databases. However, CBIR suffers from lower accuracy in retrieving images from large-scale image databases. In this paper, the proposed system is an improvement of the convolutional neural network for greater accuracy and a machine learning tool that can be used for automatic image retrieval. It includes two phases

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Vehicular Ad-hoc Network (VANET) – A Review
...Show More Authors

This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.

View Publication
Scopus (11)
Crossref (7)
Scopus Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
The concept of violence in political thought (Theoretical study, compared with the concept of terrorism)
...Show More Authors

The researcher of human history finds that the first social relations on earth were represented by the violence of Adam, peace be upon him, Cain and Abel. Violence has been a phenomenon of life and society. The history of history is full of all forms of violence and its forms. It speaks of cruelty, oppression and states. History began, in some of its chapters, written with the blood of the victims. It is a testimony to the cruelty of human beings. His human nature and his sin have played a major role that can not be overlooked in the development of important and fundamental developments in some historical turning points where violence was a necessity for life, and its launching change, renewal and reform, and major revolutions in human h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
The Chinese vision of US rapprochement with Taiwan in the administration of President Joe Biden
...Show More Authors

The recent escalation in Southeast Asia showed that the region is on the verge of political and economic crises through the United States and its allies imposing economic sanctions against China, and a military escalation that may begin with China’s invasion of Taiwan, especially since two-thirds of the American forces in the world are located in the Taiwan Strait and the South China Sea.

The United States claims that it is ready to defend the island of Taiwan in the event of the start of Chinese military operations, but the reality shows that the United States supports Taiwan militarily by equipping it with modern weapons to defend itself. Supporting Taiwan economically by engaging it in trade agreements with US allies in the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Integration The Cost Techniques with Balanced Scorecard for The Purposes of Measuring and Evaluating Performance
...Show More Authors

The effective application of the method of measuring and evaluating performance according to the Balanced  Scorecard the need for an information system a comprehensive and integrated for internal and external environment, Which requires the need to develop accounting information system in general and cost management information systems to suit the particular requirements of the environment in terms of the development of modern methods of measurement to include the use of some methods that have proven effective in measuring and evaluating performance.

The research problem in need of management to develop methods of measuring and evaluating performance through the use of both financial measures and non

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Analysing errors in learning the preasent continuous tense:Associating interference with strategy of instruction
...Show More Authors

0

View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Compared Some Estimators Ordinary Ridge Regression And Bayesian Ridge Regression With Practical Application
...Show More Authors

Maulticollinearity is a problem that always occurs when two or more predictor variables are correlated with each other. consist of the breach of one basic assumptions of the ordinary least squares method with biased estimates results, There are several methods which are proposed to handle this problem including the  method To address a problem  and  method To address a problem , In this research a comparisons are employed between the biased   method and unbiased   method with Bayesian   using Gamma distribution  method  addition to Ordinary Least Square metho

... Show More
View Publication Preview PDF
Crossref