Preferred Language
Articles
/
bsj-6848
Spatiotemporal Modeling in Wireless Communication Networks
...Show More Authors

This study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be complementary to each other. However, the results explore the flows of each governorate at two levels of abstraction: The Macroscopic and Mesoscopic. These results found that the spatiotemporal interaction models are complementary to the other, as the determined flows based on the radiation model have been used in the gravitational model. Furthermore, flows summary among all the governorates as well as for each of them has been obtained separately. Thus, based on the total number of flows, the highest attraction rate was between Nineveh and Dhi Qar governorates which reached , while the lowest attraction was between Wasit and Karbala governorates which reached . In addition, the extracted geographical maps showed each governorate ratio. Regarding the color of each governorate that degraded from light to dark, which indicated the low to high attraction respectively. In the future, it is possible to obtain more detailed data, and to use complex network algorithms for analyzing this data.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 09 2025
Journal Name
Al-adab Journal
Investigating Classroom Verbal and Nonverbal Communication
...Show More Authors

The present study aims at investigating classroom verbal and nonverbal communication at the departments of English language . An observation checklist has been constructed , which is distributed into several domains that include a number of items to investigate classroom communication . Face validity and reliability coefficient have been computed. The checklist has been applied on 86 instructors at the Colleges of Education and Arts, Departments of English Language at the Universities of ThiQar, Basrah ,and Maysan . One sample t- test and Two independent sample t-test formulas have been used. Final results reveal that college instructors use verbal communication inside their classrooms and non- verbal communication has not been employed by

... Show More
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
2018 International Conference On Computer And Applications (icca)
Evolutionary Perspective of Mobile Communication Technologies
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
2018 International Conference On Computer And Applications (icca)
Evolutionary Perspective of Mobile Communication Technologies
...Show More Authors

Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (33)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Improving the Network Lifetime in Wireless Sensor Network for Internet of Thing Applications
...Show More Authors

Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
MODELING DEATH RATE OF THE COVID-19 PANDEMIC IN IRAQ
...Show More Authors

View Publication Preview PDF
Scopus
Publication Date
Wed May 30 2018
Journal Name
International Journal Of Computer Networks & Communications
Robot Human Interface for Housekeeper Robot with Wireless Capabilities
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Wed Oct 09 2019
Journal Name
Journal Of The College Of Education For Women
Silence as a Means of Communication in Harold Pinter’s The Caretaker
...Show More Authors

Harold Pinter’s The Caretaker(1959) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Harold Pinter to use a lot of pauses and silences in all the plays he wrote instead of words. Samuel Beckett preceded Pinter in doing so in his plays and one way to express the bewilderment of modern man during the 20th century is through the use of no language in the dramatic works. Language is no more important to modern man; instead, he uses silence to express his feelings. Silence is more powerful than the words themselves. That’s why long and short pauses can be seen throughout all Pinter’s plays.

In this play, th

... Show More
View Publication Preview PDF