Preferred Language
Articles
/
aRZf44sBVTCNdQwCzePv
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of data transmission at the original targeted location. Initially, healthcare data was collected. Preprocessing is achieved by the normalization method. An EEEF data offloading scheme is proposed. A fruit fly optimization (FFO) technique is utilized. The performance metrics such as energy consumption, delay, resource utilization, scalability, and packet loss are analyzed and compared with existing techniques. The future scope will make use of a revolutionary optimization approach for IoMT.

Scopus Crossref
View Publication
Publication Date
Sun Dec 30 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation of the Rock Mechanical Properties Using Conventional Log Data in North Rumaila Field
...Show More Authors

Hydrocarbon production might cause changes in dynamic reservoir properties. Thus the consideration of the mechanical stability of a formation under different conditions of drilling or production is a very important issue, and basic mechanical properties of the formation should be determined.
There is considerable evidence, gathered from laboratory measurements in the field of Rock Mechanics, showing a good correlation between intrinsic rock strength and the dynamic elastic constant determined from sonic-velocity and density measurements.
The values of the mechanical properties determined from log data, such as the dynamic elastic constants derived from the measurement of the elastic wave velocities in the material, should be more a

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation of the Rock Mechanical Properties Using Conventional Log Data in North Rumaila Field
...Show More Authors

Hydrocarbon production might cause changes in dynamic reservoir properties. Thus the consideration of the mechanical stability of a formation under different conditions of drilling or production is a very important issue, and basic mechanical properties of the formation should be determined. There is considerable evidence, gathered from laboratory measurements in the field of Rock Mechanics, showing a good correlation between intrinsic rock strength and the dynamic elastic constant determined from sonic-velocity and density measurements. The values of the mechanical properties determined from log data, such as the dynamic elastic constants derived from the measurement of the elastic wave velocities in the material, should be more accurate t

... Show More
Publication Date
Thu Mar 17 2016
Journal Name
International Journal Of Computer Applications
Analysis of Wind Speed Data and Annual Energy Potential at Three locations in Iraq
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
A Face Mask Detection Method in the Era of the COVID-19 Pandemic Based on GLCM and YOLO
...Show More Authors

In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Nov 27 2018
Journal Name
The Iraqi Geological Journal
CHRONOSTRATIGRAPHICALLY BASED RESERVOIR MODEL FOR CENOMANIAN CARBONATES, SOUTHEASTERN IRAQ OILFIELDS
...Show More Authors

The Cenomanian – Turronian sedimentary succession in the south Iraq oil fields, including Ahmadi, Rumaila, Mishrif and Khasib formations have undergone into high-resolution reservoir-scale genetic sequence stratigraphic analysis. Some oil-wells from Majnoon and West-Qurna oil fields were selected as a representative case for the regional sequence stratigraphic analysis. The south Iraqi Albian – Cenomanian – Turronian succession of 2nd-order depositional super-sequence has been analyzed based on the Arabian Plate chronosequence stratigraphic context, properly distinguished by three main chrono-markers (The maximum flooding surface, MFS-K100 of the upper shale member of Nahr Umr Formation, MFS-K140 of the upper Mishrif carbonate

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation for 3-DoF SCARA Robot based PLC
...Show More Authors

Abstract 

This paper presents mechanical and electrical design, and implementation  process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (18)
Crossref (12)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More