Preferred Language
Articles
/
txZ4rIoBVTCNdQwClKJW
The effect of using XCAST based routing protocol in wireless ad hoc networks
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 6th International Conference On Information Communication And Management (icicm)
Enhancing case-based reasoning retrieval using classification based on associations
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Historical description of Ghazuti (al-Khandaq and Banu Qurayza) Hegira 5 - AD 626
...Show More Authors

Research Summary

 

Praise be to God, and may blessings and peace be upon our master Muhammad al-Mustafa, his family, his companions, and those who follow his gift until the Day of Judgment.

As for the dimension: This is a historical description of my conquest (Al-Khandaq and Ba

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Petroleum Research And Studies
Selection of an Optimum Drilling Fluid Model to Enhance Mud Hydraulic System Using Neural Networks in Iraqi Oil Field
...Show More Authors

In drilling processes, the rheological properties pointed to the nature of the run-off and the composition of the drilling mud. Drilling mud performance can be assessed for solving the problems of the hole cleaning, fluid management, and hydraulics controls. The rheology factors are typically termed through the following parameters: Yield Point (Yp) and Plastic Viscosity (μp). The relation of (YP/ μp) is used for measuring of levelling for flow. High YP/ μp percentages are responsible for well cuttings transportation through laminar flow. The adequate values of (YP/ μp) are between 0 to 1 for the rheological models which used in drilling. This is what appeared in most of the models that were used in this study. The pressure loss

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
2016 International Conference On Computing, Networking And Communications (icnc)
Connectivity and rendezvous in distributed DSA networks
...Show More Authors

In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Wed Apr 01 2009
Journal Name
2009 Ieee Wireless Communications And Networking Conference
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The effect of using Nano iron oxide in radiological shielding
...Show More Authors
Abstract<p>In this study, some attenuation parameters of gamma shields were studied. This shields consisting of composite materials of Unsaturated polyester as a base material and Nano iron oxide (Fe<sub>2</sub>O<sub>3</sub>) and, micro iron (Fe) as reinforcement materials at different percentages (1, 3,5,7and 9)wt%, and with different thickness (1, 1.5, 2, 2.5, 3, 3.5and 4) cm. The results showed that the use of nanoparticles is better than the microparticales in the field of radiation shielding. It has been shown that the values of attenuation parameters of gamma it bitter in the case of nanoparticles than case of the use of micro material.</p>
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
"The Effect of Using Short stories in Enriching Students Vocabulary"
...Show More Authors

               The present study aims at answering the following questions:.

1-Which is more effective in enriching students.  Vocabulary ,the use of short stories or the      traditional way?

2-What extent has the use of short stories an effect upon the students. achievement in           vocabulary test?

3- Is there any significant difference between the male and female student of the                    experimental group in vocabulary achievement test?

 &nbsp

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Wireless Network Control System for Electro Stati Precipitator in Cement Plants
...Show More Authors

    Wireless control networks (WCNs), based on distributed control systems of wireless sensor and actuator networks, integrate four technologies: control, computer network and wireless communications. Electrostatic precipitator (ESP) in cement plants reduces the emissions from rotary kiln by 99.8% approximately. It is an important thing to change the existing systems (wireline) to wireless because of dusty and hazardous environments. In this paper, we designed a wireless control system for ESP using Truetime 2 beta 6 simulator, depending on the mathematical model that have been built using identification toolbox of Matlab v7.1.1. We also study the effect ofusing wireless network on performance and stability of the closed l

... Show More
View Publication Preview PDF
Crossref