Preferred Language
Articles
/
ijs-5716
Extending Wi-Fi Direct Single-Group Network to Multi-Group Network Based on Android Smartphone
...Show More Authors

Nowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a communication between devices, it is resorted to creating an ad hoc network using Device-to-Device technology. Wi-Fi Direct technology offers a suitable platform for creating an ad hoc network, as it supports the speed and range of standard Wi-Fi. In this paper, a mechanism is proposed to build an infrastructure-less ad hoc network, through developing the Wi-Fi direct protocol for Android smartphones. This network provides users ability to have a reliable communication, using the reliable Transmission Control Protocol only, and can continuously expand. Therefore it would be very beneficial in the absence of other infrastructure communication media such as cellular or Wi-Fi internet access.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The Use of Replacement Models On Determine the Optimal Time to Replacement
...Show More Authors

Abstract:-

            The approach maintenance and replacement one of techniques of operations research whom cares of the failure experienced by a lot of production lines which consist of a set of machines and equipment, which in turn exposed to the failure or work stoppages over the lifetime, which requires reducing the working time of these machines or equipment below what can or conuct  maintenance process once in a while or a replacement for one part of the machine or replace one of the machines in production lines. In this research is the study of the failure s that occur in some parts of one of the machines for the General Company for Vege

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Replacement of Line Loads acting on slabs to equivalent uniformly Distributed Loads
...Show More Authors

This study aims to derive a general relation between line loads that acting on two-way slab system and the equivalent uniformly distributed loads. This relation will be so useful to structural designer that are used to working with a uniformly distributed load and enable them to use the traditional methods for analysis of two-way systems (e.g. Direct Design Method). Two types of slab systems, Slab System with Beams and Flat Slab Systems, have been considered in this study to include the effect of aspect ratio and type of slab on the proposed relation. Five aspect ratios, l2/l1 of 0.5, 0.75, 1.0, 1.5 and 2.0, have been considered for both types of two-way systems.
All necessary finite element analyses have been executed with SAFE Soft

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Semantic Based Video Retrieval System: Survey
...Show More Authors

In this review paper a number of studies and researches are surveyed, in order to assist the upcoming researchers, to know about the techniques available in the field of semantic based video retrieval. The video retrieval system is used for finding the users’ desired video among a huge number of available videos on the Internet or database. This paper gives a general discussion on the overall process of the semantic video retrieval phases. In addition to its present a generic review of techniques that has been proposed to solve the semantic gap as the major scientific problem in semantic based video retrieval. The semantic gap is formed because of the difference between the low level features that are extracted from video content and u

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 18 2021
Journal Name
Egyptian Journal Of Chemistry
Coumarin based-histone deactylace HADC inhibitors
...Show More Authors

Coumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity

View Publication
Scopus (1)
Scopus
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
FM Based Localization: A Proposed Improvement
...Show More Authors

Localization is an essential issue in pervasive computing application. FM performs worse in some indoor environment when its structure is same to some extent the outdoor environment like shopping mall. Furthermore, FM signal are less varied over time, low power consumption and less effected by human and small object presence when it compared to Wi-Fi. Consequently, this paper focuses on FM radio signal technique and its characteristics that make it suitable to be used for indoor localization, its benefits, areas of applications and limitations.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Wed Jan 22 2025
Journal Name
Journal Of Physical Education
The impact of a computerized program (cogniplus) to develop the strength to focus and perform kinetic chain on the balance beam
...Show More Authors

View Publication