research centers


Search results: Found 44

Listing 1 - 10 of 44 << page
of 5
>>
Sort by

Article
Authentication of RSA via BAN logic

Author: Israa N.A. Alsalhi
Journal: Journal of Kufa for Mathematics and Computer مجلة الكوفة للرياضيات والحاسوب ISSN: 11712076 Year: 2019 Volume: 6 Issue: 1 Pages: 1-7
Publisher: University of Kufa جامعة الكوفة

Loading...
Loading...
Abstract

Web exchanges are conducted through an open network that lacks central management; it is, therefore, impossible to identify a communication partner, especially in a distributed system. Authentication is the basis of security in such systems. Providing secure communication becomes problematic in CRN because cognitive node can join and leave network dynamically that leading to be many threats targeting this kind of network. In this paper, we are using analysis authentication protocol of RSA algorithm by BAN logic also It using C# programing . By analyzing via BAN logic, we will see if this protocol is confidential, and can it be used in cognitive radio networks.


Article
Shortage Sanitation Services in the Outskirts of Baghdad and its Environmental Impacts

Authors: Alaa R.H. Al-Obaidi --- Sara D.A. Zangana --- Saja H.S. Al-Sudany
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2019 Volume: 37 Issue: 1 Part (c) special Pages: 1-5
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Abstract- This study focuses on evaluation of the reality of wastewater services inthe areas of outskirts of Baghdad which the responsibility of their implementationrests on the province of Baghdad and the ministry of construction and housing andgeneral municipalities/ the General Directorate of Sewerage GDS, and to suggestthe possibility to improve these services in light of the plans developed by theconcerned authorities and the proportion of disability in the services suffered bythose areas. The study concluded that the completion of the stopped project becauseof the financial crisis will raise the proportion of serves population toapproximately 71.4%, and the construction of new projects will raise theproportion to approximately 100%


Article
Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study
دراسة مقارنة: تحليل كفاءة الأداء وحجم الأحمال لحركة المرور (الخدمات وتناقل البيانات) في الشبكات الخاصة الافتراضية

Author: Subhi Aswad Mohammed صبحي أسود محمد
Journal: AL-NAHRAIN JOURNAL FOR ENGINEERING SCIENCES مجلة النهرين للعلوم الهندسية ISSN: 25219154 / eISSN 25219162 Year: 2019 Volume: 22 Issue: 4 Pages: 283-293
Publisher: Al-Nahrain University جامعة النهرين

Loading...
Loading...
Abstract

This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance. The OPNET and BOSON simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response.

هذا العملِ يُقدّم تصميم لشبكة خاصة إنترانت مدمجة بتقنية الشبكة الخاصة الافتراضية (VPN). الإنترانتَ طُبّقتْ لمشروع يَشْملُ مركزِ خدمة رئيسي وأربعة مواقعِ مُوَزَّعة على منطقة جغرافية واسعة ربطت بإستخدام الشبكة العامة الأنترنت. يَتضمّنُ كُلّ موقع عدد من الشبكات المحليةِ والذي يَعتمدُ على متطلبات خدمات المستخدمين. توفر الشبكة خدمات المعلومات والتطبيقات الضرورية مثل التصفّحُ، قاعدة البيانات، بريد إلكتروني، ارسال الملفات وخدمات الصوت (IP Telephony). يهدف العمل تقييم ودراسة تأثيرَ أستخدام الشبكة الافتراضية الخاصة على خصائص الشبكةِ المُصَمَّمةِ ومُقَارَنَة النَتائِجِ في حالة عدم أستخدامها. كما تم استخدام تقنيةً موازنة الحمل باستخدام خوادم خاصة لإدارة عملية توزيع حمل الخادم عبر كل خوادم الشبكة للحصول على أفضل إستجابة للمنظومة. تم تطبق الاختبارات على أربع تصاميم مختلفة للشبكات؛ تصميم الشبكة بدون إستخدام تقنية الشبكة الخاصة الافتراضية، تصميم الشبكة بإستخدام تقنية الشبكة الخاصة الافتراضية، تصميم الشبكة بإستخدام خوادم مركزية وأخرى موزعة وتصميم الشبكة تحت تأثير إستخدام خوادم لموازنة الحمل. تم تنفيذ الاختبارات على الشبكات المقترحة باستخدام نوعان من البروتوكولات (L2TP) و (IPSec). ان تحليل النتائج بين بأن زمن استجابة التطبيقات هي أعلى عند أستخدام الشبكات الخاصة الافتراضية ولمختلف انواع الـبيانات بالمقارنة مع نفس الشبكة التي لاتستخدم القنوات الافتراضية. أفضلية استخدام التنشيط المتزامن لتفعيل التطبيقات كحل لمشكلة التأخير في أنطلاق التطبيق للفترة الزمنية الأولية أثناء تشغيل التطبيق. تناول البحث تحليل كفاءة ألاداء وفحص درجة رضاء المستخدم وتقنيات فحص نوعية الخدمة (QoS). كذلك فحص مقدار تأخير هذه القنوات هو بسبب عمليات التشفير وفك التشفير لقنوات الـ (VPN).


Article
A parallel Numerical Algorithm for Solving Some Fractional Integral Equations

Journal: Ibn Al-Haitham Journal For Pure And Applied Science مجلة ابن الهيثم للعلوم الصرفة والتطبيقية ISSN: 16094042/ 25213407 Year: 2019 Volume: 32 Issue: 1 Pages: 178-186
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

In this study, He's parallel numerical algorithm by neural network is applied to type ofintegration of fractional equations is Abel’s integral equations of the 1st and 2nd kinds. Using aLevenberge – Marquaradt training algorithm as a tool to train the network. To show the efficiency ofthe method, some type of Abel’s integral equations is solved as numerical examples. Numericalresults show that the new method is very efficient problems with high accuracy.


Article
Particle Swarm Optimization Based LQ-Servo Controller for Congestion Avoidance

Authors: Thaker M. Nayl --- Sana S. Sabry1
Journal: IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING المجلة العراقية لهندسة الحاسبات والاتصالات والسيطرة والنظم ISSN: 18119212 Year: 2019 Volume: 19 Issue: 1 Pages: 63-70
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

The network congestion is an essential problem that leads to packetslosing and performance degradation. Thus, preventing congestion in thenetwork is very important to enhance and improve the quality of service. Activequeue management (AQM) is the solution to control congestion in TCP networkmiddle nodes to improve theire performance. We design a linear quadratic(LQ)-servo controller as an AQM applied to TCP network to control congestionand attempt to achieve high quality of service under dynamic networkenvironments. The LQ-servo controller is proposed to provide queue lengthstabilization with a small delay and faster settling time. The designed controllerparameters are tuned by using the particle swarm optimization (PSO) method.The PSO algorithm was fundamentally applied to find the optimal controllerparameters Q and R, such that a good output response could be obtained. The PIcontroller is examined for comparison reasons. The MATLAB simulation resultshows that the controller is more effective than the PI in reaching zero steadystateerror with better congestion avoidance under the dynamic networkenvironment. Moreover, the proposed controller achieves a smaller delay andfaster settling time.


Article
Predicate the Ability of Extracorporeal Shock Wave Lithotripsy (ESWL) to treat the Kidney Stones by used Combined Classifier

Authors: Samera Shams Hussein --- Lubab Ahmed Tawfeeq --- Sukaina Sh Altyar
Journal: Journal of Al-Qadisiyah for Computer Science and Mathematics مجلة القادسية لعلوم الحاسوب والرياضيات ISSN: 20740204 / 25213504 Year: 2019 Volume: 11 Issue: 1 Pages: Comp Page 41-52
Publisher: Al-Qadisiyah University جامعة القادسية

Loading...
Loading...
Abstract

Extracorporeal Shock Wave Lithotripsy (ESWL) is the most commonplace remedy for kidney stone. Shock waves from outside the body frame are centered at a kidney stone inflicting the stone to fragment. The success of the (ESWL) treatment is based on some variables such as age, sex, stone quantity stone period and so on. Thus, the prediction the success of remedy by this method is so important for professionals to make a decision to continue using (ESWL) or to using another remedy technique. In this study, a prediction system for (ESWL) treatment by used three techniques of mixing classifiers, which is Product Rule (PR), Neural Network (NN) and the proposed classifier called Nested Combined Classifier (NCC). The samples had been taken from 2850 actual sufferers cases that had been treated at Urology and Nephrology center of Iraq. The results from three cases have been compared to actual treatment results of (ESWL) for trained and nontrained cases and compared the results of three models. The results show that (NCC)approach is the most accurate method in prediction the efficient of uses (ESWL) remedy in treatment the kidney stone.


Article
Morphometric analysis of Domilan basin in northern Iraq using geographic information System.
تحليل المتغيرات المورفومترية لحوض وادي دوميلان في شمال شرق العراق باستخدام نظم المعلومات الجغرافية

Loading...
Loading...
Abstract

This study aims to using GIS technology in the detection characteristics morphometric River Basin Domelan represented characteristics of spatial and longitudinal and formal and topographic characteristics of sewer water in order to build a geographic database of the basin , was the use of visual space DEM and a map of Iraq type Ship file in the identification and mapping of topographic The sewer water was introduced into these maps to B.s. Arc GIS 10.3 has been producing a map of the basin of river and a network of water , which are classified to or less the same , according to the way the introduction of Wadi Analysis and an application within the application program Arc GIS, and painted map of digital elevation contour lines of the study area , was the production of digital maps and took various morphometric measurements and make some spatial relationships between these various properties that include the pelvis. As has been the study of the natural characteristics affecting his post in the pelvis and the rocky nature of the climate and topographic features.The area of the pelvis College (86.005km²) and has been drawing anthropomorphic terrain us reflects the topographic characteristics and the extent of its impact on the river network properties (longitudinal and numerical), as well as the classification of these sewage into river arranged according to the numerical properties and longitudinal.

تهدف الدراسة الى استخدام تقنية نظم المعلومات الجغرافية في الكشف عن الخصائص المورفومترية لحوض وادي دوميلان والمتمثلة بالخصائص المساحية والشكلية والتضاريسية وخصائص شبكة الصرف المائي من اجل بناء قاعدة معلومات جغرافية للحوض، وتم استخدام المرئية الفضائية DEM وخريطة العراق نوع Shep File في تحديد ورسم الخريطة الطبوغرافية وشبكة الصرف المائي وقد ادخلت هذه الخرائط الى برنامج Arc GIS 10.3 وقد تم انتاج خريطة للحوض النهري وللشبكة المائية والتي صنفت الى مراتبها بحسب طريقة ادخال Wadi Analysis وهو تطبيق ضمن تطبيقات برنامج Arc GIS، ورسمت خريطة الارتفاعات الرقمية والخطوط الكنتورية لمنطقة الدراسة، وتم انتاج الخرائط الرقمية واخذ مختلف القياسات المورفومترية واجراء بعض العلاقات المكانية بين مختلف تلك الخصائص التي تشتمل عليها الحوض. كما تم دراسة الخصائص الطبيعية المؤثرة في الحوض ولاسيما الطبيعة الصخرية والمناخ والخصائص الطبوغرافية. بلغت مساحة الحوض الكلية (86.005كم²) وتم رسم مقاطع تضاريسية تعكس خصائصه التضاريسية ومدى تأثيرها على خصائص الشبكة النهرية ( الطولية والعددية)، فضلا تصنيف هذه المجاري الى رتب نهرية خرائطيا بحسب الخصائص العددية والطولية.


Article
Convolution Neural Network with Dual Tree Complex Wavelet Transform Preprocessor for Universal Image Steganalysis

Authors: Halah Hasan Mahmoud --- Hanaa Mohsin Ahmed
Journal: Journal of Al-Qadisiyah for Computer Science and Mathematics مجلة القادسية لعلوم الحاسوب والرياضيات ISSN: 20740204 / 25213504 Year: 2019 Volume: 11 Issue: 3 Pages: Comp 43-58
Publisher: Al-Qadisiyah University جامعة القادسية

Loading...
Loading...
Abstract

Recently, deep learning models based on convolutional neural networks (CNN) have been used in image steganalysis problems. In this paper, we present different architecture of CNN with dual tree complex wavelet transform for preprocessing before input images put into system. The main task of this transform is for exploiting the difference between cover and stego images through shift variance property. The net consists of five successive convolutions layers. Each one following by normalization and pooling layers ends with fully connected layer. The performance of system is evaluated through accuracy, precision, recall and f-score measures. The results show effectiveness of it with more than 0.9 precision values. HUGO, WOW and UNIWARD algorithms selected for implementation.


Article
Experimental Study and Artificial Neural Networks Prediction of Effective Parameters in Continuous Dieless Wire Drawing

Authors: Ameen Ahmed Nassar --- Jaafar Khalaf Ali --- Rafid Jabbar Mohammed
Journal: Basrah Journal for Engineering Science مجلة البصرة للعلوم الهندسية ISSN: Print: 18146120; Online: 23118385 Year: 2019 Volume: 19 Issue: 1 Pages: 52-63
Publisher: Basrah University جامعة البصرة

Loading...
Loading...
Abstract

The dieless drawing process is an innovative methodemanated and appeared in coincidence with development of theconcept of metal superplasticity. It is utilized from the localheating of a wire or tube to a specified temperature and followedby a local cooling, so an additional deformation is inhibited. Inthis study, a special dieless drawing machine was designed tocarry out an experimental program on SUS304-stainless steel wirehaving diameter of (1.6-2) mm to investigate the main processparameters such as speeds, heat quantity, heating coil width andheating-cooling separation distance. Also, a numerical modelbased on thermo-mechanical analysis was developed and validatedwith experimental program. Furthermore, an artificial neuralnetwork ANN model based on current experimental data wasprepared to predict the dieless drawing behavior. A maximum areareduction of 40.7% was obtained in single pass. A 3.12mm/sfeeding velocity and 4.97mm/s drawing velocity were realizedthrough the experimental tests. The results showed that bothdrawing force and wire profile were effected by increasing offeeding speed, heating coil width and separation distance. Also, itis confirmed that strain rate was reduced by increasing the heatingcoil width and the reduction ratio was promoted. A maximumerror of 21% was recorded between ANN model and experimentalresults. The results showed a good agreement amongexperimental, numerical and ANN models.


Article
Neural Network Based of a New User IP Address Determination and Address Conflict Elimination

Authors: Raid W. Daoud --- Wissam S. Hassan
Journal: DIYALA JOURNAL OF ENGINEERING SCIENCES مجلة ديالى للعلوم الهندسية ISSN: 19998716/26166909 Year: 2019 Volume: 12 Issue: 3 Pages: 15-21
Publisher: Diyala University جامعة ديالى

Loading...
Loading...
Abstract

In this paper, the neural network (NN) is used tocontrol the remote IP address that related to user device.When the IP address assigned carefully and controlled bya novel tool, the work performance and service qualitywill be better. The input for the NN determineddepending on the repeated problem in recent networksand the available parameters which are in the main servernode. The training process done by determining therequired training function and activation function for allneurons in the NN. The performance of the proposedmethod was (1*10-20) or less in more cases and the errorof the learning process is nearly (1*10-6). In addition to IPaddress control, the proposed method is a good manner tooptimize the security issue by specializing an IP addressfor a given user that can't be used by other device.Finally, the NN subject the produced IP address for thegiven users for test and validation which reached to thegoal at smallest time (~0.0001s) and little number ofiteration (9 - 20) epoch.

Listing 1 - 10 of 44 << page
of 5
>>
Sort by
Narrow your search

Resource type

article (44)


Language

English (34)

Arabic (3)

Arabic and English (3)


Year
From To Submit

2019 (44)