Preferred Language
Articles
/
yBg-W5QBVTCNdQwCSgWd
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.

Scopus Crossref
View Publication
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Modeling of Corrosion Rate Under Two Phase Flow in Horizontal Pipe Using Neural Network
...Show More Authors

The present study develops an artificial neural network (ANN) to model an analysis and a simulation of the correlation between the average corrosion rate carbon steel and the effective parameter Reynolds number (Re), water concentration (Wc) % temperature (T o) with constant of PH 7 . The water, produced fom oil in Kirkuk oil field in Iraq from well no. k184-Depth2200ft., has been used as a corrosive media and specimen area (400 mm2) for the materials that were used as low carbon steel pipe. The pipes are supplied by Doura Refinery . The used flow system is all made of Q.V.F glass, and the circulation of the two –phase (liquid – liquid ) is affected using a Q.V.F pump .The input parameters of the model consists of Reynolds number , w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Study of Mass Transfer Coefficient in Slurry Bubble Column Reactor Using Neural Network
...Show More Authors

 

The objective of this study was to develop neural network algorithm, (Multilayer Perceptron), based correlations for the prediction overall volumetric mass-transfer coefficient (kLa), in slurry bubble column for gas-liquid-solid systems. The Multilayer Perceptron is a novel technique based on the feature generation approach using back propagation neural network. Measurements of overall volumetric mass transfer coefficient were made with the air - Water, air - Glycerin and air - Alcohol systems as the liquid phase in bubble column of 0.15 m diameter. For operation with gas velocity in the range 0-20 cm/sec, the overall volumetric mass transfer coefficient was found to decrease w

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Deterioration Model for Sewer Network Asset Management in Baghdad City (case study Zeppelin line)
...Show More Authors

Asset management involves efficient planning of economic and technical performance characteristics of infrastructure systems. Managing a sewer network requires various types of activities so the network can be able to achieve a certain level of performance. During the lifetime of the network various components will start to deteriorate leading to bad performance and can damage the infrastructure. The main objective of this research is to develop deterioration models to provide an assessment tool for determining the serviceability of the sewer networks in Baghdad city the Zeppelin line was selected as a case study, as well as to give top management authorities the appropriate decision making. Different modeling techniques

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Role of System Strategic Learning Smart In Sustainability Success of Managing Network e-Business
...Show More Authors

Purpose: Determining and identifying the relationships of smart strategic education systems and their potential effects on sustainable success in managing clouding electronic business networks according to green, economic and environmental logic based on vigilance and awareness of the strategic mind.

Design: Designing a hypothetical model that reveals the role and investigating audit and cloud electronic governance according to a philosophy that highlights smart strategic learning processes, identifying its assumptions in cloud spaces, choosing its tools, what it costs to devise expert minds, and strategic intelligence.

Methodology:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The Quantitative Analysis To Assess The Efficiency Of The Transport Network In Sader City
...Show More Authors

     This research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement  for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with  economic concentration.                                                           &n

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Evaluation the water quality of the potable water network in Al-Shuala/ Baghdad City
...Show More Authors

In this research, the water quality of the potable water network in
Al-Shuala Baghdad city were evaluated and compare them with the
Iraqi standards (IQS) for drinking water and World Health
Organization standards (WHO), then water quality index (WQI) were
calculator: pH, heavy metals (lead, cadmium and iron), chlorides,
total hardness, turbidity, dissolved oxygen, total dissolved solid and
electrical conductivity. Water samples are collected weekly during
the period from February 2015 to April 2015 from ten sites. Results
show that the chlorides, total dissolved solid and electrical
conductivity less than acceptable limit of standards, but total
hardness and heavy metals in some samples higher than acceptabl

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 09 2015
Journal Name
International Journal Of Innovations In Scientific Engineering
USING ARTIFICIAL NEURAL NETWORK TECHNIQUE FOR THE ESTIMATION OF CD CONCENTRATION IN CONTAMINATED SOILS
...Show More Authors

The aim of this paper is to design artificial neural network as an alternative accurate tool to estimate concentration of Cadmium in contaminated soils for any depth and time. First, fifty soil samples were harvested from a phytoremediated contaminated site located in Qanat Aljaeesh in Baghdad city in Iraq. Second, a series of measurements were performed on the soil samples. The inputs are the soil depth, the time, and the soil parameters but the output is the concentration of Cu in the soil for depth x and time t. Third, design an ANN and its performance was evaluated using a test data set and then applied to estimate the concentration of Cadmium. The performance of the ANN technique was compared with the traditional laboratory inspecting

... Show More
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Automatic Spike Neural Technique for Slicing Bandwidth Estimated Virtual Buffer-Size in Network Environment
...Show More Authors

The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modifie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2024
Journal Name
Iraqi Geological Journal
Geomechanical Modeling and Artificial Neural Network Technique for Predicting Breakout Failure in Nasiriyah Oilfield
...Show More Authors

Wellbore instability is one of the major issues observed throughout the drilling operation. Various wellbore instability issues may occur during drilling operations, including tight holes, borehole collapse, stuck pipe, and shale caving. Rock failure criteria are important in geomechanical analysis since they predict shear and tensile failures. A suitable failure criterion must match the rock failure, which a caliper log can detect to estimate the optimal mud weight. Lack of data makes certain wells' caliper logs unavailable. This makes it difficult to validate the performance of each failure criterion. This paper proposes an approach for predicting the breakout zones in the Nasiriyah oil field using an artificial neural network. It

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref