Preferred Language
Articles
/
nReFNY8BVTCNdQwC1GFZ
A Light Weight Multi-Objective Task Offloading Optimization for Vehicular Fog Computing
...Show More Authors

Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mobile vehicles. Several studies have tackled the task offloading problem in the VFC field. However, recent studies have not carefully addressed the transmission path to the destination node and did not consider the energy consumption of vehicles. This paper aims to optimize the task offloading process in the VFC system in terms of latency and energy objectives under deadline constraint by adopting a Multi-Objective Evolutionary Algorithm (MOEA). Road Side Units (RSUs) x-Vehicles Mutli-Objective Computation offloading method (RxV-MOC) is proposed, where an elite of vehicles are utilized as fog nodes for tasks execution and all vehicles in the system are utilized for tasks transmission. The well-known Dijkstra's algorithm is adopted to find the minimum path between each two nodes. The simulation results show that the RxV-MOC has reduced significantly the energy consumption and latency for the VFC system in comparison with First-Fit algorithm, Best-Fit algorithm, and the MOC method.

Scopus Crossref
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Political Sciences Journal
Fiscal federalism: a study of the concept and models
...Show More Authors

يمثل الأخذ بالنظام الفيدرالي أطاراً تنظيمياً لشكل الدولة و مرحلة تحول مهمة في بنية الدولة العامة في مختلف مجالاتها، فالانتقال من المركزية في أدارة الشؤون العامة للدولة الى النمط الفيدرالي يمثل تحولا بنيوياً وسيكولوجياً ،حيث يكون هنالك توزيع مكاني - عمودي للسلطة والثروة بين الوحدات المكونة للدولة بشكل يختلف كليا عن الحالة المركزية، ونجد صور تنظيمية عديدة تتأسس ضمن اطار الفيدرالية العام ،

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Composite Materials
Fabrication and characterization of bioactive composite: A pilot study
...Show More Authors

The increasing requirement and use of dental implant treatments has rendered dental implantology indispensable in dentistry. The aim of this study is to determine the optimum concentration of calcium silicate to be incorporated into a polyetherketoneketone (PEKK) matrix used as an implant material to enhance the bioactivity and mechanical properties of the composite compared with unmodified PEKK. In this study, different weight percentage (wt%) of micro-calcium silicate (m-CS) is incorporated into PEKK with ethanol as a binder. Subsequently, the mixture is dried in a forced convection oven at 120°C and poured into customized molds to fabricate a bioactive composite via compression molding (310°C, 15 MPa, and 20 min holding time

... Show More
View Publication
Scopus (6)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Oct 31 2024
Journal Name
Sabrao Journal Of Breeding And Genetics
THE ROLE OF NANOTECHNOLOGY IN CROP IMPROVEMENT – A REVIEW
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Iraqi Journal Of Physics
Spectrophotometrically Analysis of PMMA as a low – Doses Dosimeter
...Show More Authors

Polymethylmethacrylate film (PMMA) of thickness 75 μm was evaluated Spectrophotometrically for using it as a low-doses gamma radiation dosimeter. The doses were examined in the range 0.1 mrad-10 krad. Within an absorption band of 200-400 nm, the irradiated films showed an increase in the absorption intensity with increasing the absorbed doses. Calibration curves for the changes in the absorption differences were obtained at 218, 301, and 343 nm. At 218 nm the response for the absorbed doses is a linear in the range 10 mrad- 10 krad. Hence it is recommended to be adopted as an environmental low doses dosimeter

View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Results on a Pre-T_2 Space and Pre-Stability
...Show More Authors

This paper contains an equivalent statements of a pre-  space, where  are considered subsets of with the product topology. An equivalence relation between the preclosed set  and a pre-  space, and a relation between a pre-  space and the preclosed set  with some conditions on a function  are found. In addition, we have proved that the graph  of  is preclosed in if  is a pre-  space, where the equivalence relation  on  is open.

     On the other hand, we introduce the definition of a pre-stable ( pre-stable) set by depending on the concept of a pre-neighborhood, where we get that every stable set is pre-stable. Moreover, we obtain that

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
A Systematic Review of Brain-Computer Interface Based EEG
...Show More Authors

The futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Mon Apr 08 2019
Journal Name
International Journal Of Building Pathology And Adaptation
A scientometric analysis of BIM studies in facilities management
...Show More Authors
Purpose

The purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.

Design/methodology/approach

This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.

Findings

The findi

... Show More
View Publication
Scopus (36)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (109)
Crossref (98)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (10)
Crossref (9)
Scopus Crossref