Preferred Language
Articles
/
6RaxCYoBVTCNdQwCe4_a
A taper-in-etch based hybrid fiber Mach-Zehnder interferometer hydrogen sensor
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (15)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
The Academic Problems of Family Counseling Diploma Students At Saudi Universities based on some Variables
...Show More Authors

The research aims to identify the academic problems of family counseling diploma students at Saudi Universities. In addition, to identify the differences in these problems according to gender, marital status, place of study, academic specialization, and GPA. The sample consisted of (491) students. The researcher has used one questionnaire for academic problems prepared by the researcher.  The research revealed the following results: There were academic problems among family counseling diploma students at Saudi Universities, the most problems were related to the systems and administrations of the university, then the field training, the buildings, classrooms and campus facilities, then the academic courses, after that the exams, then

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Cascade position-torque control strategy based on function approximation technique (FAT) for flexible joint robots
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 31 2006
Journal Name
Modern Sport
The standerd Levels of Some Physical abilities based on playing centers of basketball for youngsters
...Show More Authors

Research,s Summary The purpose of the research was to specify the standerd Levels for results of basketball for Iraqi young sters, Becuse there werenot the standerd Levels which related to the testings abilities of the players based on plying centers specially the physical abilities, This made weakness in arrangement and putting the suitable training studies for different age stadges which suitable with game ,s requirements, besides evaluation the performance of the plyers in common and the levels of the coachs train in special according to the scientific style. The researchers depended on (8) special testings of chossen physical abilities, These testings applied on the teams, young players for sharing clubs among excellent series of basket

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Enhancing the Performance of Wireless Body Area Network Routing Protocols Based on Collaboratively Evaluated Values
...Show More Authors

Wireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
An open cloud-based platform for the creation and delivery of smart applications and services
...Show More Authors
Abstract<p>With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Real-Time Cloth Simulation on Virtual Human Character Using Enhanced Position Based Dynamic Framework Technique
...Show More Authors

     Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications.   This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2023
Journal Name
Biomass Conversion And Biorefinery
Lactic acid-based deep eutectic solvents and activated carbon for soap removal from crude biodiesel
...Show More Authors

View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref