Preferred Language
Articles
/
GhYMBYcBVTCNdQwCtC4L
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Evaluation of FEMM software for magnetic analysis of the magnetorheological application
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The Burden of Chronic Obstructive Pulmonary Disease COPD in Stable Patients and its Association with Inflammatory Biomarkers and Body Mass Index
...Show More Authors

Background: Chronic obstructive pulmonary disease (COPD) is a progressive airflow limitation that is preventable but not curable. It is associated with persistent symptoms that cause a considerable burden on individual productivity at work, and daily activities, and reduced quality of life, also burdening the healthcare system and society. Objectives: The study aims to measure the burden of COPD on patients in terms of daily activities and work productivity. It also seeks to investigate some inflammatory biomarkers' levels and their correlation with selected outcomes. Patients and Methods: A cross-sectional study on 120 stable COPD patients who were diagnosed and treated according to the GOLD guidelines at Kirkuk General Hospital's

... Show More
Preview PDF
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The impact of strategic innovation components of the application Business process re-engineering: A survey Study of the consultant of a sample of managers and their assistants and consultants in the General Company for Post & Telecommunications
...Show More Authors

Abstract:

        Organizations need today to move towards strategic innovation, which means the analysis of positions, especially the challenges faced by the change in the external environment, which makes it imperative for the organization that you reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures. Now this research dilemma intellectual two-dimensional, yet my account in not Take writings and researchers effect strategic innovation in re-engineering business processes, according to science and to inform the researcher, and after the application represented in the non-application of such resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Materials Today Sustainability
Structure and performance of polyvinylchloride microfiltration membranes improved by green silicon oxide nanoparticles for oil-in-water emulsion separation
...Show More Authors

View Publication
Scopus (27)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Wireless channel-based ciphering key generation: effect of aging and treatment
...Show More Authors

Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Serum ferritin level and B12 in a sample of Iraqi re-current aphthous stomatitis patients
...Show More Authors

Background: Recurrent aphthous stomatitis (RAS) is one of the most common oral mucosal disorders with a prevalence of 50-66%. The prevalence of hematinic deficiencies including ferritin and vitamin B12 deficiencies and their role in the prophylaxis and development of RAS is not well known. Many studies have demonstrated a high prevalence of hematinic deficiencies in patients with RAS. This study aimed to compare the serum level of ferritin and vitamin B12 in patients with recurrent aphthous ulcers and healthy controls. Subjects, Materials and Methods: The data were collected from patients who needed blood analysis to exclude anemia from November 2020 to May 2021. The study was approved by the institutional ethics committee. After recordi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Feb 08 2021
Journal Name
Public Works Management & Policy
Causes of Problems in Post-Disaster Emergency Re-Construction Projects—Iraq as a Case Study
...Show More Authors

This study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is

... Show More
View Publication
Scopus (23)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Engineering
Evaluation of the Physical and Chemical Treatment of Wastewater for the Dairy Industry
...Show More Authors

Dairy wastewater generally contains fats, lactose, whey proteins, and nutrients. Casein precipitation causes the effluent to decompose into a dark, strong-smelling sludge. Fluid waste contains soluble organic matter, suspended solids, and gaseous organic matter, which cause undesirable taste and smell, grant tone and turbidity, and advance eutrophication, which plays an essential role in increasing biological oxygen demand (BOD) in water. It also contains detergents and disinfecting agents from the rinses and washing processes, which increase the need for chemical oxygen (COD). One of the characteristics of dairy effluents is their relatively high temperature, high organic contents, and wide pH range, so the discharge of wastewater into

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref