Preferred Language
Articles
/
bsj-3961
Performance Evaluation of Mobility Models over UDP Traffic Pattern for MANET Using NS-2
...Show More Authors

  The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes,  different traffic rates, different traffic sources, different pause times and different simulation times .  A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Reference Point Group Model) and MGM (Manhattan Grid Model) mobility models above CBR traffic sources. The results of Reference Point Group Model simulation illuminate that routing protocol performance is best with RPG mobility model than other models.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Matec Web Of Conferences
Brain Tumour Detection using Fine-Tuning Mechanism for Magnetic Resonance Imaging
...Show More Authors

In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnormal blocks. Through experimental tests, progress made by the suggested means is assessed and verified. As a result, in terms of qualitative assessment, it is found that the performance of proposed method is satisfactory and may contribute to the development of reliable MRI brain tumour diagnosis and treatments.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Coagulation - Flotation Process for Removing Oil from wastewater using Sawdust+ Bentonite
...Show More Authors

In many industries especially oil companies in Iraq consumed large quantities of water which will produce oil-contaminated water which can cause major pollution in agricultural lands and rivers. The aim of the present work is to enhance the efficiency of dispersed air flotation technique by using highly effective and cost-efficient coagulant to treating gas oil emulsion. The experimental work was carried out using bubble column made of Perspex glass (5cm I.D, 120cm height). A liquid was at depth of 60cm. Different dosage of sawdust +bentonite at ratio 2:1 (0.5+ 0.25; 1+ 0.5 and 2+1) gm and alum at concentration (10,20and30mg/l) at different pH ( 4 and 7) were used to determine optimum dosages of coagulant. Jar test exper

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
International Journal Of Advances In Intelligent Informatics
An automatic lip reading for short sentences using deep learning nets
...Show More Authors

One study whose importance has significantly grown in recent years is lip-reading, particularly with the widespread of using deep learning techniques. Lip reading is essential for speech recognition in noisy environments or for those with hearing impairments. It refers to recognizing spoken sentences using visual information acquired from lip movements. Also, the lip area, especially for males, suffers from several problems, such as the mouth area containing the mustache and beard, which may cover the lip area. This paper proposes an automatic lip-reading system to recognize and classify short English sentences spoken by speakers using deep learning networks. The input video extracts frames and each frame is passed to the Viola-Jone

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An efficient method for stamps recognition using Haar wavelet sub-bands
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Direct method for Solving Nonlinear Variational Problems by Using Hermite Wavelets
...Show More Authors

In this work, we first construct Hermite wavelets on the interval [0,1) with it’s product, Operational matrix of integration 2^k M×2^k M is derived, and used it for solving nonlinear Variational problems with reduced it to a system of algebric equations and aid of direct method. Finally, some examples are given to illustrate the efficiency and performance of presented method.

View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Osmotic Membrane Bioreactor for Oily Wastewater Treatment using External & Internal Configurations
...Show More Authors

The present work aims to study the treatment of oily wastewater by means of forward osmosis membrane bioreactor process. Side stream (external) configuration and submerged (internal) configuration of osmotic membrane bioreactor were performed and investigated. The experimental work for each configuration was carried out continuously over 21 days. The flux behavior of forward osmosis membrane in an osmotic membrane bioreactor (OMBR) was investigated, using NaCl as the draw solution and CTA as FO membrane. The effect of mixed liquor suspended solids (MLSS) concentration and TDS accumulation of bioreactor on water flux and membrane fouling behaviors was detected. The accumulation and rejection of nutrients in the bioreactor (Nitrate, COD,

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
The Dissolution Study For Sodium Selenite Tablets Using Atomic Absorption Spectrophotometer
...Show More Authors

The development of a meaningful dissolution procedure for drug products with limited water solubility has been a challenge to both the pharmaceutical industry and the agencies that regulate them. Natural surfactants aid in the dissolution and subsequent absorption of drugs with limited aqueous solubility. In vitro, various techniques have been used to achieve adequate dissolution of the sparingly water – soluble or water insoluble drug products such as the use of mechanical methods (i.e., increased agitation and the disintegration method) or hydro alcoholic medium or large volumes of medium. The necessity of assuring the quality of drugs , especially those with low aqueous solubility and in vivo absorption , has led to the development and

... Show More
View Publication Preview PDF
Crossref