Preferred Language
Articles
/
N_oVtpkBMF18lwyZqs2R
An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
...Show More Authors
Abstract<p>With the recent growth of global populations, main roads in cities have witnessed an evident increase in the number of vehicles. This has led to unprecedented challenges for authorities in managing the traffic of ambulance vehicles to provide medical services in emergency cases. Despite the high technologies associated with medical tracks and advanced traffic management systems, there is still a current delay in ambulances’ attendance in times of emergency to provide patients with vital aid. Therefore, it is indispensable to introduce a new emergency service system that enables the ambulance to reach the patient in the least congested and shortest paths. However, designing an efficient algorithm to plan the best route for an ambulance is still a global goal and a challenge that needs to be solved. This article introduces an Internet of Things emergency services system based on a real-time node rank index (NR-index) algorithm to find the best route for the ambulance to reach the patient and provide the required medical services in emergency cases. The proposed system design copes with the dynamic traffic conditions to guarantee the shortest transport time. For this purpose, a vehicular ad hoc network is employed to collect accurate real-time traffic data. In this article, we suggest two parameters to compromise distance and congestion level. The first is the distance between the patient and the surrounding ambulance vehicles, and the second determines the congestion level to avoid the path with high congestion traffic. The system employs a developed real-time NR-index algorithm to select a suitable ambulance vehicle to respond to emergency cases at a low travel cost with the fastest journey. Finally, our system makes it easier for ambulance vehicles to use the best route and avoid heavy traffic. This allows them to make their way to the patient quickly and increases the chance of saving lives. The simulation results show significant improvements in terms of average travel time, average travel speed, and normalized routing load.</p>
Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 19 2019
Journal Name
Iraqi Journal Of Science
Efficient Iterative Method for Solving Korteweg-de Vries Equations
...Show More Authors

The Korteweg-de Vries equation plays an important role in fluid physics and applied mathematics. This equation is a fundamental within study of shallow water waves. Since these equations arise in many applications and physical phenomena, it is officially showed that this equation has solitary waves as solutions, The Korteweg-de Vries equation is utilized to characterize a long waves travelling in channels. The goal of this paper is to construct the new effective frequent relation to resolve these problems where the semi analytic iterative technique presents new enforcement to solve Korteweg-de Vries equations. The distinctive feature of this method is, it can be utilized to get approximate solutions for travelling waves of 

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Efficient Approach for Solving (2+1) D- Differential Equations
...Show More Authors

     In this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.

View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Computers, Materials &amp; Continua
A Technical Framework for Selection of Autonomous UAV Navigation Technologies and Sensors
...Show More Authors

View Publication
Scopus (31)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue Mar 02 2021
Journal Name
Humanitarian And Natural Sciences Journal
THE LINGUISTIC STRUCTURES OF THE HISTORIANS ALYAQOUBI (284 AH / 897 AD) ARE A MODEL
...Show More Authors

The research in the linguistic structures of the historians Al-Yaqoubi is considered a model of the important topics in historical studies in general, given its importance in the lives of peoples due to its connotations and meanings that summarize interpretation, clarification, and prolonged speech, as it includes life meanings with many dimensions, these structures have been used in historical incidents Important, and throughout the different ages, as it can be used to support an opinion, solve problems, prove evidence, increase wisdom, and it needs rich life experiences, and a sound language, to use it, and needs a wide absorptive capacity for the recipient, the research included linguistic structures in the achievement of science , Lingu

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2017
Journal Name
Journal Of Nuclear Medicine
Capability of a novel small field of view hybrid gamma camera (HGC) for sentinel lymph node and small organ imaging
...Show More Authors

Objectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropom

... Show More
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
An Electronic and Web-Based Authentication, Identification, and Logging Management System
...Show More Authors

The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
the response to service marketing failure
...Show More Authors

Because of the tremendous changes in the business environment and significant growth in living standards, increased demand for services in general and about the realized practitioners in the field of service that traditional marketing strategies and models administrative based solutions to mono as the price alone does not lead to the desired outcomes with customers and even organizations as it does not apply always for the manufacture of their services unique . therefore , the need to learn marketing service order and a clear and critical to avoid failures in service and the marketing document to knowledge would avoid the organization that the failure in the delivery of service and enhances the desired response to fix it in a tim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref