Preferred Language
Articles
/
FRasmYcBVTCNdQwCXFgR
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

Crossref
View Publication
Publication Date
Tue Jul 04 2023
Journal Name
Qalaai Zanist Scientific Journal
The Role of The Environmental Observer and The Environmental Police in Protecting the Environment in Iraqi Law
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Ieee Transactions On Intelligent Transportation Systems
Real-Time Intersection-Based Segment Aware Routing Algorithm for Urban Vehicular Networks
...Show More Authors

High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination

... Show More
View Publication
Scopus (70)
Crossref (61)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
2020 42nd Annual International Conference Of The Ieee Engineering In Medicine & Biology Society (embc)
Recurrent Fusion of Time-Domain Descriptors Improves EMG-based Hand Movement Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Political Sciences Journal
Protecting woman during armed conflicts under the development of international humanitarian law
...Show More Authors

The international humanitarian law found the special rules to protect women meanwhile the armed conflicts whether international or non-international. These rules are adopted for woman because of two reasons : that she is from civilians and on the other hand that her special constitution demands a special protection. The international community's attention of women is increased as a result of the tragic situation that faced women around the world especially in the Middle East and particularly in Iraq during the American-British war and ISIS period, these two periods sort many negative effects that reach women such as captivity, slavery, sexual enslavement and rape women especially Yazidis and Christians....

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Direct Solution Scheme for Wide-Angle Electromagnetic Scattering Problems Using Compressive Sensing-Based Method of Moments
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 02 2020
Journal Name
International Journal Of Pharmaceutical Research
A turbidimetric method for the quantitative determination of cyproheptadine hydrochloride in tablets using an optoelectronic detector based on the LEDs array
...Show More Authors

Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Fri Oct 02 2020
Journal Name
International Journal Of Pharmaceutical Research
A turbidimetric method for the quantitative determination of cyproheptadine hydrochloride in tablets using an optoelectronic detector based on the LEDs array
...Show More Authors

View Publication Preview PDF
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref (1)
Crossref