Preferred Language
Articles
/
ijs-3909
Efficiently-managed Cloudly-Secured Mobile User Data Sharing Code Implementation
...Show More Authors

Increasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authentication, Data Owner (DO) Sending files to Cloud, Sending password, Send Mail and Send SMS. Suppose Data Users need to communicate and share information on Cloud with the help of Mobile Agent only. So, Data Users may be assured that whatever resource required in the cloud with the documents on their Mobile Agent in the office

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Molecular Characteristics of Multidrug Resistant Acinetobacter baumannii Isolated from Baghdad Hospitals
...Show More Authors

A total of 100 clinical sample from (urine, sputum and swabs of wound , burn and ear) were collected from patients in different hospitals of Baghdad during the period from December 2013 to May 2014. 15 isolates (15%) identified belong to Acinetobacter baumannii, swabs of wounds were represented in high percentage of A.baumannii isolates (40%) while percentage of other samples were variable. Susceptibility of 15 A.baumannii isolates were tested toward 16 different Antimicrobial agents, the results showed all isolates were multi drug resistant. In addition, Polymerase Chain Reaction Technique (PCR) was performed to detection the resistance genes encoding the Oxacillinases enzymes. The PCR analysis showed that the presence of insertion sequ

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Datura stramoium Extract Inhibits Mitosis in Cancer Cells
...Show More Authors

  The aim of this study was to evaluate the anti mitotic activity of ether extract prepared from Datura stramoium plant on cancer cells.  Recently oncology studies are directed toward substances which act somehow to induce apoptosis or to prevent abnormal dividing of cell, that may provide therapeutic strategies for the treatment of cancer. Thus, many research on various types of plants such as fruits, vegetables, other editable plants and toxic plants have been done in vitro and in vivo. But, few studies on Datura plant were occurred and there was no previous study dealing with its effect on proliferative activity of cancer cells.  In current study, two types of common malignant tumor were tested in vitro. These were mamm

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
RADAR PARAMETER GENERATION TO IDENTIFY THE TARGET
...Show More Authors

Due to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Statistical analysis from a Gender perspective
...Show More Authors

This research is a theoretical study that deals with the presentation of the literature of statistical analysis from the perspective of gender or what is called Engendering Statistics. The researcher relied on a number of UN reports as well as some foreign sources to conduct the current study. Gender statistics are defined as statistics that reflect the differences and inequality of the status of women and men overall domains of life, and their importance stems from the fact that it is an important tool in promoting equality as a necessity for the process of sustainable development and the formulation of national and effective development policies and programs. The empowerment of women and the achievement of equality between men and wome

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 23 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Face mask detection based on algorithm YOLOv5s
...Show More Authors

Determining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on

... Show More
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
ORGANIZATION OF MEMORY CHIPS IN MEMORY SYSTEMS THAT HAVE WORD SIZE WIDER THAN 8-BIT
...Show More Authors

This paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 26 2021
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Review on Medical Child Abuse and Child Protection
...Show More Authors

Background

Medical child abuse describes a child receiving unnecessary, harmful, or potentially harmful medical care at the caretaker's instigation.

Objectives

To focus on medical child abuse as an entity and emphasize its epidemiology, clinical presentations, prevention, and management.

Results

In the UK, the annual incidence of medical child abuse in children below one year increased to 3:100,000, while its prevalence in Arabs, including Iraq, is ambiguous due to lack of evidence and improper clinician's awareness. The mean age at diagnosis is 14 months to 2.7 years. Female caregivers are the most common offenders. Clinically, medical child abuse

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 02 2022
Journal Name
Remittances Review
Analyzing the Influence of Information and Communication Technologies (ICT) on the Per Capita GDP of Iraq from 2004 to 2021
...Show More Authors

The study aims to identify the theoretical literature for all the variables of the study (ICT, GDP) as well as to identify the practical side of the impact of ICT on the per capita GDP in Iraq for the period (2004-2021). The study was based on the hypothesis that ICT impacts per capita GDP in Iraq. The problem of the study was to answer the question: does ICT contribute to per capita GDP? The study concluded that an increase in the rate of internet users per 100 people by one unit would increase. Increasing the landline telephone rate per 100 people by one unit will increase GDP per capita. In addition, increasing the mobile phone rate per 100 people by one unit will increase GDP per capita. The study recommended adopting rational poli

... Show More
View Publication
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Simulation of Obstacle Avoidance for Auto Guided Land Vehicle
...Show More Authors

This research is concerned with designing and simulating an auto control system for a car provided with obstacle avoidance sensors. This car is able to pass through predefined path an around the detected obstacles, and then come back to the intended path. The IR sensor detects the existence of the obstacle through an assumed range of detection, while the visual sensor (camera) feeds back an image including the path that contains  an obstacle, which can be useful for determining the obstacle's length, speed, and direction. According to such information, the controller creates transient away point along the longitudinal axis of the obstacle which is the same as the transverse axis of the simulator path at an assumed distance from the

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks
...Show More Authors

To ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref