Preferred Language
Articles
/
ehZr44sBVTCNdQwCyeOk
A novel data offloading scheme for QoS optimization in 5G based internet of medical things
...Show More Authors

The internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of data transmission at the original targeted location. Initially, healthcare data was collected. Preprocessing is achieved by the normalization method. An EEEF data offloading scheme is proposed. A fruit fly optimization (FFO) technique is utilized. The performance metrics such as energy consumption, delay, resource utilization, scalability, and packet loss are analyzed and compared with existing techniques. The future scope will make use of a revolutionary optimization approach for IoMT.

Publication Date
Thu Sep 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Strongly (E,F)-convexity with applications to optimization problems
...Show More Authors

In this paper, a new class of nonconvex sets and functions called strongly -convex sets and strongly -convex functions are introduced. This class is considered as a natural extension of strongly -convex sets and functions introduced in the literature. Some basic and differentiability properties related to strongly -convex functions are discussed. As an application to optimization problems, some optimality properties of constrained optimization problems are proved. In these optimization problems, either the objective function or the inequality constraints functions are strongly -convex. 

View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 22 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Assessment of Causality, Severity and Seriousness of Adverse Event Following Immunization in Iraq: A Retrospective Study Based on Iraqi
...Show More Authors

Immunization is one of the most cost-effective and successful public health applications. The results of immunization are difficult to see as the incidence of disease occurrence is low while adverse effects following the immunization are noticeable, particularly if the vaccine was given to apparently healthy person. High safety expectations of population regarding the vaccines so they are more prone to hesitancy regarding presence of even small risk of adverse events which may lead to loss of pub

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Sep 30 2010
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
PREDICTION OF FINITE CONCENTRATIONBEHAVIOR FROM INFINITE DILUTION EGUILIBRIUM DATA
...Show More Authors

Experimental activity coefficients at infinite dilution are particularly useful for calculating the parameters needed in an expression for the excess Gibbs energy. If reliable values of γ∞1 and γ∞2 are available, either from direct experiment or from a correlation, it is possible to predict the composition of the azeotrope and vapor-liquid equilibrium over the entire range of composition. These can be used to evaluate two adjustable constants in any desired expression for G E. In this study MOSCED model and SPACE model are two different methods were used to calculate γ∞1 and γ∞2

View Publication Preview PDF
Publication Date
Tue Nov 27 2018
Journal Name
The Iraqi Geological Journal
CHRONOSTRATIGRAPHICALLY BASED RESERVOIR MODEL FOR CENOMANIAN CARBONATES, SOUTHEASTERN IRAQ OILFIELDS
...Show More Authors

The Cenomanian – Turronian sedimentary succession in the south Iraq oil fields, including Ahmadi, Rumaila, Mishrif and Khasib formations have undergone into high-resolution reservoir-scale genetic sequence stratigraphic analysis. Some oil-wells from Majnoon and West-Qurna oil fields were selected as a representative case for the regional sequence stratigraphic analysis. The south Iraqi Albian – Cenomanian – Turronian succession of 2nd-order depositional super-sequence has been analyzed based on the Arabian Plate chronosequence stratigraphic context, properly distinguished by three main chrono-markers (The maximum flooding surface, MFS-K100 of the upper shale member of Nahr Umr Formation, MFS-K140 of the upper Mishrif carbonate

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation for 3-DoF SCARA Robot based PLC
...Show More Authors

Abstract 

This paper presents mechanical and electrical design, and implementation  process of industrial robot, 3-DoF type SCARA (selective compliment assembly robot arm),with two rotations and one translation used for welding applications.The design process also included the controller design which was based on PLC(programmable logic controller) as well as selection of mechanical and electrical components.The challenge was to use the available components in Iraq with reasonable costs. The robot mentioned is fully automated using programmable logic controller PLC(Zelio type SR3-B261BD),with 16inputs and 10 outputs. The PLC was implemented in FBD logic to obtain three different automatic motions with hi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Hiding Techniques for Dynamic Encryption Text based on Corner Point
...Show More Authors

Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (17)
Crossref (11)
Scopus Crossref