Preferred Language
Articles
/
jih-1400
Real-time control for the transmission of information in wireless networks
...Show More Authors

Wireless  lietworking is·  constantly improving,  changing  and

though  ba ic  principle  is the same.  ['nstead of  using standard  cables  to transmit information fmm one point to another (qr more), it .uses  radio signals.  This paper  presents .a case  study considedng real-time remote

cqntroJ using Wireless UDP/JP-based networks,. The aim of-this werk is to

reduce  real-time· remote control  system  based upon a simulatio.n  model,

which can operate via general communication  l"]etworks, whieh on bodies. modern wireles  tcchnolqgy.

The  first  part includes· a  brief  study  oJ  wireless  commun.ication p.rinciples as well as a short description of the c-urrent system. Tbe second part describes  measurement  of the sy;>rem and in addition to · analysis 6f the  test  results.  The  conclu.sio:ps  whjcb     are   made  ba ed   pan   the measured data of :the system. Also, fhe encountered  problems  during   he

test simulations are raised up. A s.imulated process for the model is used

in.stead  of a reaJ one in  order to get comp(!rable results; ho.wever it

Indicate? a. goed research  tool and a basis for future work in the real-time

remote control  research.  Als0, Some future- development schemes  of the

system are· discussed as we.!I.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Review on Vision Based Real Time Fingertip Detection Approaches
...Show More Authors

    Computer vision is an emerging area with a huge number of applications. Identification of the fingertip is one of the major parts of those areas. Augmented reality and virtual reality are the most recent technological advancements that use fingertip identification. The interaction between computers and humans can be performed easily by this technique. Virtual reality, robotics, smart gaming are the main application domains of these fingertip detection techniques. Gesture recognition is one of the most fascinating fields of fingertip detection. Gestures are the easiest and productive methods of communication with regard to collaboration with the computer. This analysis examines the different studies done in the field of

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Design and Implementation of Real Time Face Recognition System (RTFRS)
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Secure Location Privacy Transmitting Information on Cellular Networks
...Show More Authors

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Real-Night-time Road Sign Detection by the Use of Cascade Object Detector
...Show More Authors

     Variations in perspective, illumination, motion blur, and weatherworn degeneration of signs may all be essential factors in road-sign identification. The current research purpose is to evaluate the effectiveness of the image processing technique in detecting road signs as well as to find the appropriate threshold value range for doing so. The efficiency of the cascade object detector in detecting road signs was tested under variations of speed and threshold values. The suggested system involved using video data to calculate the number of frames per second and creating an output file that contains the specified targets with their labels to use later in the final process (i.e., training stage). In the current research, two videos

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
2016 Ieee Symposium Series On Computational Intelligence (ssci)
A fusion of time-domain descriptors for improved myoelectric hand control
...Show More Authors

View Publication
Scopus (33)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
Community Tracking in Time Evolving Networks: An Evolutionary Multi-objective Approach
...Show More Authors

In real world, almost all networks evolve over time. For example, in networks of friendships and acquaintances, people continually create and delete friendship relationship connections over time, thereby add and draw friends, and some people become part of new social networks or leave their networks, changing the nodes in the network. Recently, tracking communities encountering topological shifting drawn significant attentions and many successive algorithms have been proposed to model the problem. In general, evolutionary clustering can be defined as clustering data over time wherein two concepts: snapshot quality and temporal smoothness should be considered. Snapshot quality means that the clusters should be as precise as possible durin

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 04 2023
Journal Name
International Journal Of Professional Business Review
An Empirical Study to Measure the Impact of Information Technology Governance Under the Control Objectives for Information and Related Technologies on Financial Performance
...Show More Authors

Purpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration.   Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance.   Design/methodology/approach: To investigate the effect of information technology; we the valu

... Show More
View Publication
Scopus (20)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Remote Patient Healthcare surveillance system based real-time vital signs
...Show More Authors

Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of  ECG signal such as Q,R,S, and T waves.  The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Sumer 1
Evaluation of the effects of Curcumin gel against Periodontopathic Bacteria (Porphyromonas gingivalis) using real-time time-polymerase chain reaction technology
...Show More Authors

Periodontal disease is typically treated with mechanical debridement of the tooth surface. It may, however, be insufficient to eradicate pathogenic microorganisms on its own. Because of the microbial etiology of periodontitis, systemic or local antibiotic therapy is used as an adjunct treatment. The present study aimed to determine the effects of curcumin gel on Porphyromonas gingivalis. Eleven patients with stage II and III periodontitis were registered in the study. A double-blinded split-mouth design followed. Periodontal pockets were distributed into 2 groups; the test group received scaling and root planing along with curcumin gel, while the control group received scaling and root planing along with a placebo gel. Plaque index,

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref