Preferred Language
Articles
/
hRcJOI8BVTCNdQwCoWNI
Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Apr 20 2023
Journal Name
Fire
An Efficient Wildfire Detection System for AI-Embedded Applications Using Satellite Imagery
...Show More Authors

Wildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob

... Show More
View Publication
Scopus (25)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Advanced Research In Dynamical And Control Systems
The impact of node density over routing protocols in manet by using NS-3
...Show More Authors

Scopus (5)
Scopus
Publication Date
Mon Apr 30 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
An efficient artificial fish swarm algorithm with harmony search for scheduling in flexible job-shop problem
...Show More Authors

Flexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best

... Show More
View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Nahrain Mobile Learning System (NMLS)
...Show More Authors

The work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
PRESS COVERAGE OF CRISES: (A Research Drawn from a Doctoral Thesis)
...Show More Authors

Media is one of the main and effective factors; and it is a tool of crisis management equipment. Media is one of the most dangerous, effective and decisive weapons in modern conflicts; a tool for making events and influencing their events and trends as a means of reporting as the enormous capabilities of media which help media to move very quickly, and cross borders; and overcome obstacles, through many means of audio, reading and visual. As its ability, moreover, to influence the psychological and intellectual control of communities, and behaviors.

Intelligent media is, then, used in crises management and coverage. Crises have been existed with the presence of man on Earth. Thei

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Nov 01 2024
Journal Name
Optical Materials
Nanostructured LNTO saturable absorber for generating multi-wavelength laser in Q-switched EDFL
...Show More Authors

In this paper, we propose a new and efficient ferroelectric nanostructure metal oxide lithium niobate [(Li1.075Nb0.625Ti0.45O3), (LNTO)] solid film as a saturable absorber (SA) for modulating passive Q-switched erbium-doped fiber laser (EDFL). The SA is fabricated as a nanocomposite solid film by the drop-casting process in which the LNTO is planted within polyvinylidene fluoride-trifluoroethylene [P(VDF-TrFE)] as host copolymer. The optical and physical characteristics of the solid film are experimentally established. The SA is incorporated within the cavity of EDFL to examine its capability for producing multi-wavelength laser. The experimental results proved that a multi-wavelength laser is produced, where stable four lines with central

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Baghdad Science Journal
Spatiotemporal Modeling in Wireless Communication Networks
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Spatiotemporal Modeling in Wireless Communication Networks
...Show More Authors

This study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref