Search Results - "Khidhir, Abdulsattar"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Real-Time Monitoring Mosul Water Supply by Kaiys, Mohammed, Khidhir, AbdulSattar Mohammed

    “…UN studies show Iraq is the fifth country most prone to desertification. The Nineveh Water Directorate, which distributes water to the populace, faces several…”
    Get full text
    Conference Proceeding
  2. 2

    Deep Learning Based Real Time Diabetes Recognition by Nafea, Dalal Zeyad, Khidhir, AbdulSattar Mohammed

    “…In the modern era, diabetes is one of a group of common diseases that affect people of different age groups, as diabetics suffer from the possibility of…”
    Get full text
    Conference Proceeding
  3. 3

    Fire Recognition Using EfficientNet and ResNet 50 by Habbib, Abdulla Mohannad, Khidhir, AbdulSattar Mohammed

    “…Desertification is mainly brought on by forest fires, which also have catastrophic effects on ecosystems supporting agriculture and forests. Modern fire…”
    Get full text
    Conference Proceeding
  4. 4
  5. 5

    Protection Against Internal Intruding using Host Identifier Authentication by Alkhayaat, Basil, khidhir, Abdulsattar, Ibraheem, Omar

    “…Network security has become one of the most important interesting areas for researches. Protecting the network can be done by many mechanisms. Among the most…”
    Get full text
    Journal Article
  6. 6

    Mn - Polynomials of some special for cog-graphs by Mustafa, Raghad A., Ali, Ahmed M., Khidhir, AbdulSattar M.

    “…The maximum distance between two subsets Ś and S of vertex set V(G) of a connected graph G is maximum distance between any two vertices u and v such that u…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Application of width distance on semi-star link satellite constellation by Khidhir, Abdulsattar M., Ali, Ahmed M., Aziz, Shuaa' M.

    “…The width distance between any two distinct vertices, which is the minimum of the length container between them in a connected graph, is applied to star link…”
    Get full text
    Journal Article
  9. 9
  10. 10
  11. 11

    Encrypted Data Hiding Retrieval of an Image using LSB Based on RBF Network by Amera Badran, Abdulsattar Khidhir, laheeb Ibrahim

    “…In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an…”
    Get full text
    Journal Article
  12. 12

    Home Automation Management with WLAN (802.11g) and RF Remote Control by Mahmood Majeed, Abdulsattar Khidhir, Firas Yosif

    “…The home automation becomes important, because it gives the user the comfort and ease for using the home devices. The implementation and design of wireless…”
    Get full text
    Journal Article
  13. 13

    Process migration based on memory to memory mechanism by Khidhir, AbdulSattar M., Mustafa, Bassam A., Saleh, Nadia T.

    “…Process migration involves transferring both static and dynamic states of a process from one machine to another. Migration requires checkpointing the dynamic…”
    Get full text
    Conference Proceeding
  14. 14

    Design and Implementation of a CPU Bound Process Migration in Windows 7 by Khidhir, A. M., Mustafa, B. A., Saleh, N. T.

    “…This paper presents a new mechanism for user-level process migration in a network of homogeneous systems running Windows 7 operating system. The methodology…”
    Get full text
    Conference Proceeding