Preferred Language
Articles
/
oRZYSIcBVTCNdQwC-0Hb
Flying Ad hoc Networks (FANET): Performance Evaluation of Topology Based Routing Protocols
...Show More Authors

Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conducted to determine the influence of flying altitude. The results indicate that hybrid routing protocols outperform other types of protocols in terms of average throughput. Proactive protocols, on the other hand, have the least jitter.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Al-khwarizmi Engineering Journal
The Inverse Solution Of Dexterous Robot By Using Neural Networks
...Show More Authors

The inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of School Health
The Role of Virtual Education Networks on Students’ Mental Health
...Show More Authors

Background: The Covid-19 pandemic changed the world; its most important achievement for education was changing the approach from traditional to virtual education. The present study aimed to investigate the role of virtual education networks on mental health of students including personality, beliefs, scientific, and cultural dimensions, in selected countries.Methods: This was an exploratory and applied study. According to the phenomenology strategy, theoretical saturation occurred after 24 semi-structured and targeted qualitative interviews with teachers from Iran, Iraq, Syria and Lebanon, in 2023. Quantitative data was collected through a researcher-made online questionnaire with 423 participants. Teachers with at least a Bachelor’s degr

... Show More
View Publication Preview PDF
Scopus
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Sensing Performance of Modified Single Mode Optical Fiber Coated With Nanomaterials-Based Ammonia Sensors Operated in the C-Band
...Show More Authors

View Publication
Scopus (15)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 13 2022
Journal Name
Frontiers In Chemistry
Numerical analysis of the energy-storage performance of a PCM-based triplex-tube containment system equipped with arc-shaped fins
...Show More Authors

This study numerically intends to evaluate the effects of arc-shaped fins on the melting capability of a triplex-tube confinement system filled with phase-change materials (PCMs). In contrast to situations with no fins, where PCM exhibits relatively poor heat response, in this study, the thermal performance is modified using novel arc-shaped fins with various circular angles and orientations compared with traditional rectangular fins. Several inline and staggered layouts are also assessed to maximize the fin’s efficacy. The effect of the nearby natural convection is further investigated by adding a fin to the bottom of the heat-storage domain. Additionally, the Reynolds number and temperature of the heat-transfer fluid (HTF) are e

... Show More
Scopus (44)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives J.
Evaluation of the performance of triple, single crosses and their inbred in bred lines of maize under two plant population
...Show More Authors

Scopus (2)
Scopus
Publication Date
Thu Mar 31 2022
Journal Name
Journal Of The College Of Education For Women
News of Zubarah Family- Unionists in Nishapur and their Scientific Contributions in the two Centuries (4-6 AH/10-12 AD)
...Show More Authors

This research is concerned with qualitatively studying the history of an ancient family, one of the most prominent noble, Alawite families, that assumed the position of the Student Union for the Alawite Supervision in the city of Nishapur in Khorasan during the centries (4-6 H./ 10-12 A.H.). Thus, the research aims to investgate the historical news, and the outstanding Zubarah figures who experience the supereme the religious, historical and scientific position in Khorasan generally and Nishapur particularily. It further aims at arriving at the true meaning of the name Zubarah, and to whom it was called, and the extent of this family’s affiliation to the noble Alawi House, and how they moved to live and settle in the cities of the East

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
Language communication, and the impact of journalism after 2003 AD (a study in the two newspapers, Al-Takahi and Al-Sabah)
...Show More Authors

The methods used by the print media (press) is varied in conveying its messages and its orientations to the readers. But language takes the leading method among these methods, or a real competitor - so far - due to the characteristics and advantages of languages, including: ease, abbreviation, and development, etc.

In the midst of such events, political tensions, and what they carry of the global developments, and among which was the most important the fall of the former Iraqi regime in the spring of 2003, the press had the greatest share, and a large portion on the level of monitoring, analyzing, and interpreting the various consequences of the event. The interpreting of the news varies according to the evolving political trends

... Show More
View Publication Preview PDF
Crossref