Preferred Language
Articles
/
joe-328
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffic load parameter μ for each parent node and then use in the EWPBRC algorithm to estimate the transmission rate of parent nodes and then assign a suitable transmission rate for each child node. A comparative study between (MSNTLP with EWBPRC) and fuzzy logic controller for traffic load parameter with Exponential Weight of Priority Based Rate Control algorithm (FTLP with EWBPRC) algorithm shows that the (MSNTLP with EWBPRC) is more efficient than (FTLP with EWBPRC) algorithm in terms of packet loss, queue delay and throughput. Another comparative study between (MSNTLP with EWBPRC) and EWBPRC with fixed traffic load parameter (µ) shows that the MSNTLP with EWBPRC is more efficient than EWBPRC with fixed traffic load parameter (µ) in terms of packet loss ratio and queue delay. A simulation process is developed and tested using the network simulator _2 (NS2) in a computer having the following properties: windows 7 (64-bit), core i7, RAM 8GB, hard 1TB.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Construct an Efficient DDoS Attack Detection System Based on RF-C4.5-GridSearchCV
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The impact of wages and benefits systems on the performance of employees A field study in the General Company for Food Industries in the city of Baghdad
...Show More Authors

The research aims to find out the impact of wages and benefits systems on the performance of employees, which included the research community on a sample of employees in the company, and the sample consisted of (50) employees and an employee, A questionnaire composed as prepared (23) paragraph, use the promised statistically methods in data collected by the questionnaire analysis. The research reached a number of results, the most prominent of which were: There is a correlation between wage systems, benefits and performance of employees, and the presence of the impact of the systems of wages and benefits to the performance of employees. The research was presented a set of recommendations including: increasing the effectiveness of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 11 2019
Journal Name
Al-kindy College Medical Journal
Evaluation of Application of Nutritional Status Assessment for Children Under 5 years by Using IMCI Program in a Sample of Primary Health Care Centers in Baghdad City
...Show More Authors

Background: World Health Organization (WHO) and United Nation International Children Fund (UNICEF) developed a strategy known as Integrated Management of Childhood Illness (IMCI); which aims to reduce less than five years children morbidity and mortality in developing countries.

Objective: To assess the completion of the IMCI format status in primary health care centers, Baghdad.

Methods:  A cross sectional study with analytic element was conducted during the period from 15th  of January till 15th  May 2016 in selected Primary health centers in Baghdad, Iraq. The sample consists of form of child files less than 2 months and form from 2

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 19 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect Wisdom Management in Defferentiation Strategy for Service Operations Exploratory: Search of the Views of A Sample of the Officials in the General Establishment of Civil Aviation
...Show More Authors

Today, the success or failure of organizations depends to possess the wisdom of their managers promised that the key to organizational success of the business environment, making the right decisions, and create the ability to work and think towards discrimination of products and services the organization . Seek this research to investigation the relationship between the wisdom management and differentiation strategy for service operations . It was a test of that relationship in light of the results of the analysis of the data collected through the questionnaire distributed on a sample from (98) Director Mangers, head of department and head of division in  the General Establishment of Civil Aviation . The research used descriptive st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 03 2023
Journal Name
College Of Islamic Sciences
A critical methodological study in abrogative,abrogated, in a book of (Zad AlTafseer) in Surah Al-Baqara in the holy Quraan.
...Show More Authors

This research is a critical methodological  study deals with some Quranic verses abrogative,abrogated.

by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the  in the holy Quraan.

View Publication Preview PDF
Publication Date
Mon Mar 09 2015
Journal Name
Monthly Notices Of The Royal Astronomical Society
A reliable iterative method for solving Volterra integro-differential equations and some applications for the Lane–Emden equations of the first kind
...Show More Authors

View Publication
Crossref (7)
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
The accuracy of cone-beam computed tomography in the evaluation of boney support of teeth among patients with a unilateral cleft of lip and palate among IraqiPopulation
...Show More Authors

Background: To evaluate the bony supports of the teeth adjacent to the area of cleft in patient with unilateral cleft lip and palate and to compare these measurements with the measurements of the same teeth in non-cleft side by using CBCT. Materials and methods: The CBCT scans of 30 patients having cleft lip( unilateral) and palate(unilateral), were analyzed and the measurements of the alveolar bony support for teeth that are adjacent to the cleft area were measured with those teeth located on opposite side (non- clef) side. For each tooth, the measurements will taken for the distance between the( cementoenamel junction) (CEJ) and the bony crest (AC) at the( buccal area) was measured and the thickness of the buccal plate At zero, one, tw

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Development a Statistical Relationship between Compressional Wave Velocity and Petrophysical Properties from Logs Data for JERIBE Formation ASMARI Reservoir in FAUQI Oil Field
...Show More Authors

   The Compressional-wave (Vp) data are useful for reservoir exploration, drilling operations, stimulation, hydraulic fracturing employment, and development plans for a specific reservoir. Due to the different nature and behavior of the influencing parameters, more complex nonlinearity exists for Vp modeling purposes. In this study, a statistical relationship between compressional wave velocity and petrophysical parameters was developed from wireline log data for Jeribe formation in Fauqi oil field south Est Iraq, which is studied using single and multiple linear regressions. The model concentrated on predicting compressional wave velocity from petrophysical parameters and any pair of shear waves velocity, porosity, density, and

... Show More
View Publication
Crossref (2)
Crossref