Preferred Language
Articles
/
aRZf44sBVTCNdQwCzePv
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of data transmission at the original targeted location. Initially, healthcare data was collected. Preprocessing is achieved by the normalization method. An EEEF data offloading scheme is proposed. A fruit fly optimization (FFO) technique is utilized. The performance metrics such as energy consumption, delay, resource utilization, scalability, and packet loss are analyzed and compared with existing techniques. The future scope will make use of a revolutionary optimization approach for IoMT.

Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Results In Chemistry
Synthesis and characterization of (E)-4-(((4-(5-mercapto-1, 3, 4-oxadiazol-2-yl) phenyl) amino) methyl)-2-methoxyphenol as a novel corrosion inhibitor for mild-steel in acidic medium
...Show More Authors

View Publication
Scopus (26)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Aug 20 2023
Journal Name
International Journal Of Drug Delivery Technology
Role of higB-higA Novel Genes in Antibiotics Resistance of Pseudomonas aeruginosa
...Show More Authors

Background: Pseudomonas aeruginosa is a devious pathogen with the tendency to prompt many acute and serious chronic diseases. This study aims to detect novel genes (Toxins-Antitoxins II system), especially; higB and higA encoded from P. aeruginosa by PCR technique and the relation between these genes and antibiotic resistance of P. aeruginosa. Methods: This study detected 50 isolates of P. aeruginosa from distinct clinical sources. The most common origin of isolates was (44%) burn swabs, (22%) urine culture, (12%) wound swabs, (14%) sputum, and (8%) ear swabs. The bacteria were isolated using implantation MacConkey agar and blood agar, as well as biochemical tests including oxidase test, catalase test then VITEK-2 System of P. aerug

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Separation And Purification Technology
A comprehensive review on the use of Ti3C2Tx MXene in membrane-based water treatment
...Show More Authors

View Publication
Scopus (31)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Thu Jun 30 2016
Journal Name
Al-kindy College Medical Journal
Prevalence Of Energy Drinks Consumption Among Students Of Alkindy Medical College
...Show More Authors

Background: Energy drinks are non alcoholic beverages which contain stimulant drugs chiefly caffeine and marketed as mental and physical stimulators. Consumption of energy drinks is popular practice among college students as they are exposed to academic stress. Caffeine which is the main constituent of energy drinks could become an addictive substance or cause intoxication. Objectives: This study aims to assess the prevalence of energy drinks consumption among medical students of alkindy college of Medicine.Type of the study: A cross sectional study.Methods: It was performed at alkindy medical college on March 2016. A total number of 600 students were contacted to participate in this study. A self administered questionnaire was used to c

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 16 2022
Journal Name
Journal Of Economics And Administrative Sciences
Solving Resource Allocation Model by Using Dynamic Optimization Technique for Al-Raji Group Companies for Soft Drinks and Juices
...Show More Authors

In this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2023
Journal Name
Chemical Engineering Research And Design
Treatment of petroleum refinery wastewater by electrofenton process using a low cost porous graphite air-diffusion cathode with a novel design
...Show More Authors

View Publication
Scopus (34)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sun Jan 19 2014
Journal Name
Romanian Biotechnological Letters
Optimization conditions for bioemulsifier production by local Streptomyces sp. SS20 isolated from hydrocarbon contaminated soil
...Show More Authors

Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF