Preferred Language
Articles
/
ijs-5716
Extending Wi-Fi Direct Single-Group Network to Multi-Group Network Based on Android Smartphone
...Show More Authors

Nowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a communication between devices, it is resorted to creating an ad hoc network using Device-to-Device technology. Wi-Fi Direct technology offers a suitable platform for creating an ad hoc network, as it supports the speed and range of standard Wi-Fi. In this paper, a mechanism is proposed to build an infrastructure-less ad hoc network, through developing the Wi-Fi direct protocol for Android smartphones. This network provides users ability to have a reliable communication, using the reliable Transmission Control Protocol only, and can continuously expand. Therefore it would be very beneficial in the absence of other infrastructure communication media such as cellular or Wi-Fi internet access.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes
...Show More Authors

In this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Ingénierie Des Systèmes D Information
Performance Evaluation of Multi-Organization E-Government Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 27 2020
Journal Name
Iraqi Journal Of Science
Extractive Multi-Document Summarization Model Based On Different Integrations of Double Similarity Measures
...Show More Authors

Currently, the prominence of automatic multi document summarization task belongs to the information rapid increasing on the Internet. Automatic document summarization technology is progressing and may offer a solution to the problem of information overload. 

Automatic text summarization system has the challenge of producing a high quality summary. In this study, the design of generic text summarization model based on sentence extraction has been redirected into a more semantic measure reflecting individually the two significant objectives: content coverage and diversity when generating summaries from multiple documents as an explicit optimization model. The proposed two models have been then coupled and def

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
De-Noising of Corrupted Fluoroscopy Images Based on a New Multi-Line Algorithm
...Show More Authors

 Fluoroscopic images are a field of medical images that depends on the quality of image for correct diagnosis; the main trouble is the de-nosing and how to keep the poise between degradation of noisy image, from one side, and edge and fine details preservation, from the other side, especially when fluoroscopic images contain black and white type noise with high density. The previous filters could usually handle low/medium black and white type noise densities, that expense edge, =fine details preservation and fail with high density of noise that corrupts the images. Therefore, this paper proposed a new Multi-Line algorithm that deals with high-corrupted image with high density of black and white type noise. The experiments achieved i

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Goldie Rationally Extending Modules
...Show More Authors

     In this work, we introduce a new generalization of both Rationally extending and Goldie extending which is Goldie Rationally extending module which is known as follows: if for any submodule K of an R-module M there is a direct summand U of M (denoted by  U⊆_⊕ M) such that K β_r  U. A β_r  is a relation of K⊆M and U⊆M, which defined as  K β_r  U if and only if  K ⋂U⊆_r K and K⋂U⊆_r U.

View Publication Preview PDF
Crossref
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
⊕-s-extending modules
...Show More Authors

     The -s-extending modules will be purpose of this paper, a module M  is -s-extending if each submodule in M is essential in submodule has a supplement that is direct summand. Initially, we give relation between this concept with weakly supplement extending modules and -supplemented modules. In fact, we gives the following implications:

Lifting modules   -supplemented modules   -s-extending modules  weakly supplement extending modules.

It is also we give examples show that, the converse of this result is not true. Moreover, we study when the converse of this result is true.

View Publication Preview PDF
Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Dual of Extending Acts
...Show More Authors

Since 1980s, the study of the extending module in the module theory has been a major area of research interest in the ring theory and it has been studied recently by several authors, among them N.V. Dung, D.V. Huyn, P.F. Smith and R. Wisbauer. Because the act theory signifies a generalization of the module theory, the author studied in 2017 the class of extending acts which are referred to as a generalization of quasi-injective acts. The importance of the extending acts motivated us to study a dual of this concept, named the coextending act. An S-act MS is referred to as coextending act if every coclosed subact of Ms is a retract of MS where a subact AS of MS is said to be coclosed in MS if whenever the Rees factor ⁄ is small in th

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Purely Goldie Extending Modules
...Show More Authors

An -module  is extending if every submodule of   is essential in a direct summand of . Following Clark, an -module  is purely extending if every submodule of   is essential in a pure submodule of . It is clear purely extending is generalization of extending modules. Following Birkenmeier and Tercan, an -module     is Goldie extending if, for each submodule      of , there is a direct summand D of such that . In this paper, we introduce and study class of modules which are proper generalization of both the purely extending modules and -extending modules. We call an -module  is purely Goldie extending if, for each , there is a pure submodule P of such that  . Many c

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Fully Principally Extending Module
...Show More Authors

In this work, We introduce the concepts of an FP-Extending, FP-Continuous and FP-Quasi-Continuous which are stronger than P-Extending, P-Continuous and P-Quasi-Continuous. characterizations and properties of FP-Extending, FP-Continuous and FP-Quasi-Continuous are obtained . A module M is called FP-Extending ( FP-Continuous, FP-Quasi-Continuous) if every submodule is P-Extending (P-Continuous, P-Quasi-Continuous) .

View Publication Preview PDF