Preferred Language
Articles
/
yBg-W5QBVTCNdQwCSgWd
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.

Scopus Crossref
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of human development indicators in the context of distributive justice for Iraq for the period 2003-2013
...Show More Authors

Abstract                                                                             

The government spending in Iraq and witnessed the changes and developments, especially after 2003, which outweighed consumer spending at the expense of capital expenditure and increased support and diversity of trends towards improving pension conditions for member

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Context and its impact on the choice of Quranic singularity An applied study in some verses of repetition
...Show More Authors

The research dealt with the study of choice between a range of different words between the repetitive texts in the verses of the Koran and explain the reason behind this choice, and how the context has the greatest impact in this choice, and that each word in the Koran was placed in the most appropriate place, which can not be replaced by equivalent words, whatever The degree of similarity between them in the indication of the other because it remains at the end that each of those vocabulary synonyms are indicative, the first of them especially that makes the possibility of replacing them with the equivalent vocabulary impossible, and the second general significance and this connotation makes them share with their peers In one aspect of

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Al-kindy College Medical Journal
Trends of Neonatal Mortality in context of Case Overload in Al - Alwyia Pediatric Teaching Hospital at Baghdad during 2005-2012
...Show More Authors

Background: Data on the impact of neonatal and total pediatric admissions volume on neonatal mortality are sparse. Objectives: This study is done to estimate the neonatal mortality in relation to neonatal admissions and to total hospital admissions in Al-Alwyia Pediatric Teaching Hospital through years 2005-2012 Type of the study: A retrospective study.Methods: statistical records of all cases admitted to APTH were studied during 2005-2012.Results: Neonatal mortality decreased to the nadir at last year of study period (2012) and reached 6.1% of neonatal admissions compared to 2005 level which was 9.7 %. Mortality rate among premature and low birth weight (LBW) infants decreased also. The study also reveals that neonatal mortality constit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Arab Journal Of Basic And Applied Sciences
Analytic and numerical solutions for linear and nonlinear multidimensional wave equations
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Evaluation of the one electron expeetation values for different wave functions
...Show More Authors

The aim of this work is to evaluate the onc-electron expectation values < r > from the radial electronic density funetion D(r) for different wave ?'unctions for the 2s state of Li atom. The wave functions used were published in 1963,174? and 1993 , respectavily. Using " " ' wave function as a Slater determinant has used the positioning technique for the analysis open shell system of Li (Is2 2s) State.

View Publication Preview PDF
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
IoT System on Dynamic Fish Feeder Based on Fish Existence for Agriculture Aquaponic Breeders
...Show More Authors

Maintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Aerosol And Air Quality Research
Effect of Inner Rod Tilting on the Performance of a Cylindrical Differential Electrical Mobility Analyzer (DEMC)
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref