Preferred Language
Articles
/
lheQdZIBVTCNdQwCn7C0
Performance evaluation of Photovoltaic Panels by a Proposed Automated System Based on Microcontrollers
...Show More Authors

Crossref
View Publication
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Assessment of Solar Photovoltaic Potential in Iraq
...Show More Authors

View Publication
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 04 2021
Journal Name
Multimedia Tools And Applications
Attention enhancement system for college students with brain biofeedback signals based on virtual reality
...Show More Authors

View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Wavelet and Forecasting Wind Speed with Application
...Show More Authors

Time series analysis is the statistical approach used to analyze a series of data. Time series is the most popular statistical method for forecasting, which is widely used in several statistical and economic applications. The wavelet transform is a powerful mathematical technique that converts an analyzed signal into a time-frequency representation. The wavelet transform method provides signal information in both the time domain and frequency domain. The aims of this study are to propose a wavelet function by derivation of a quotient from two different Fibonacci coefficient polynomials, as well as a comparison between ARIMA and wavelet-ARIMA. The time series data for daily wind speed is used for this study. From the obtained results, the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Science
Gray-Scale Image Compression Method Based on a Pixel-Based Adaptive Technique
...Show More Authors

     Today in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Mar 29 2021
Journal Name
Journal Of Engineering
Experimental Investigation of Thermal Performance of Aluminum Foil Coated with Polyester in a Direct Evaporative Cooling System
...Show More Authors

An experimental study was carried out for an evaporative cooling system in order to investigate the effect of using an aluminum pad coated with fabric polyester. In the present work, it was considered to use a new different type of cooling medium and test its performance during the change in the wet-bulb temperature and dry-bulb temperature of the supply air outside of the pad, the relative humidity of the supply air, the amount of air supplied (300-600) CFM and also the change of the amount of circulated water (1.75, 2.5, 4.5) liter per minute. A decrease in the WBT of the air was obtained, whereas the WBT of the air entering the pad was 26.5 . In contrast, the WBT of the outside air had reached 23  even though eva

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values
...Show More Authors

Wireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref