Preferred Language
Articles
/
jcoeduw-981
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achieving the synchronization.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 20 2022
Journal Name
Eai Endorsed Transactions On Internet Of Things
APP innovation to Control Projects Risks Management during Crises
...Show More Authors

The goal of this study is to build an application that can be used in difficult cases and sudden circumstances during the pandemic and post-disaster state, which can be the development of digital risk management and mitigating the difficult impact of the epidemic through the improvement of IT and IoT that can be fine by finding initial solutions and make the world like a digital city that could be managed by the network. We provide this study to gain an overview of reasons for delayed and exceeded costs in a select of thirty Iraqi case projects by controlling the time and cost. The drivers of delay have been investigated in multiple countries/contexts. however, there is little country data available under the conditions that have ch

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Sep 08 2015
Journal Name
Journal Of The Faculty Of Medicine
Sciatic nerve injection injury in children: Management and outcome
...Show More Authors

W Tarik A, AW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 2

View Publication
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The philosophy of Total Quality Management for the environment
...Show More Authors
The Environmental Management System (EMS) is an important foundation for effective control of the organization's outstanding environmental performance. It applies standards for substantive review and provides a structure and a way to apply it in all aspects of th
... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Apr 08 2019
Journal Name
International Journal Of Building Pathology And Adaptation
A scientometric analysis of BIM studies in facilities management
...Show More Authors
Purpose

The purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.

Design/methodology/approach

This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.

Findings

The findi

... Show More
View Publication
Scopus (37)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Wed Feb 27 2019
Journal Name
Journal Of Low Power Electronics And Applications
Tolerating Permanent Faults in the Input Port of the Network on Chip Router
...Show More Authors

Deep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f

... Show More
View Publication
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
...Show More Authors

Software Defined Network (SDN) is a new technology that separate the ‎control plane from the data plane. SDN provides a choice in automation and ‎programmability faster than traditional network. It supports the ‎Quality of Service (QoS) for video surveillance application. One of most ‎significant issues in video surveillance is how to find the best path for routing the packets ‎between the source (IP cameras) and destination (monitoring center). The ‎video surveillance system requires fast transmission and reliable delivery ‎and high QoS. To improve the QoS and to achieve the optimal path, the ‎SDN architecture is used in this paper. In addition, different routing algorithms are ‎used with different steps. First, we eva

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of The Mechanical Behavior Of Materials
Simulation and assessment of water supply network for specified districts at Najaf Governorate
...Show More Authors
Abstract<p>This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand </p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref