Search Results - "Khidhir, Abdulsattar"
-
1
Real-Time Monitoring Mosul Water Supply
Published in 2023 International Conference on Engineering, Science and Advanced Technology (ICESAT) (21-06-2023)“…UN studies show Iraq is the fifth country most prone to desertification. The Nineveh Water Directorate, which distributes water to the populace, faces several…”
Get full text
Conference Proceeding -
2
Deep Learning Based Real Time Diabetes Recognition
Published in 2023 International Conference on Engineering, Science and Advanced Technology (ICESAT) (21-06-2023)“…In the modern era, diabetes is one of a group of common diseases that affect people of different age groups, as diabetics suffer from the possibility of…”
Get full text
Conference Proceeding -
3
Fire Recognition Using EfficientNet and ResNet 50
Published in 2023 International Conference on Engineering, Science and Advanced Technology (ICESAT) (21-06-2023)“…Desertification is mainly brought on by forest fires, which also have catastrophic effects on ecosystems supporting agriculture and forests. Modern fire…”
Get full text
Conference Proceeding -
4
Underwater Robotics: Principles, Components, Modeling, and Control
Published in Maḡallat̄ al-handasat̄ al-rāfīdayn (Online) (01-03-2024)Get full text
Journal Article -
5
Protection Against Internal Intruding using Host Identifier Authentication
Published in AL-Rafidain journal of computer sciences and mathematics (01-03-2009)“…Network security has become one of the most important interesting areas for researches. Protecting the network can be done by many mechanisms. Among the most…”
Get full text
Journal Article -
6
Mn - Polynomials of some special for cog-graphs
Published in Journal of discrete mathematical sciences & cryptography (31-03-2022)“…The maximum distance between two subsets Ś and S of vertex set V(G) of a connected graph G is maximum distance between any two vertices u and v such that u…”
Get full text
Journal Article -
7
M n – Polynomials of some special for cog-graphs
Published in Journal of discrete mathematical sciences & cryptography (29-03-2022)Get full text
Journal Article -
8
Application of width distance on semi-star link satellite constellation
Published in Journal of discrete mathematical sciences & cryptography (03-04-2021)“…The width distance between any two distinct vertices, which is the minimum of the length container between them in a connected graph, is applied to star link…”
Get full text
Journal Article -
9
Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network
Published in AL-Rafidain journal of computer sciences and mathematics (30-12-2010)Get full text
Journal Article -
10
Home Automation Management with WLAN (802.11g) and RF Remote Control
Published in AL-Rafidain journal of computer sciences and mathematics (01-03-2009)Get full text
Journal Article -
11
Encrypted Data Hiding Retrieval of an Image using LSB Based on RBF Network
Published in AL-Rafidain journal of computer sciences and mathematics (01-12-2010)“…In this paper an image is hidden in another image using one of the hiding algorithms (Least Significant Bit) to produce the stego-cover image which used as an…”
Get full text
Journal Article -
12
Home Automation Management with WLAN (802.11g) and RF Remote Control
Published in AL-Rafidain journal of computer sciences and mathematics (01-03-2009)“…The home automation becomes important, because it gives the user the comfort and ease for using the home devices. The implementation and design of wireless…”
Get full text
Journal Article -
13
Process migration based on memory to memory mechanism
Published in 2013 International Conference on Electrical Communication, Computer, Power, and Control Engineering (ICECCPCE) (01-12-2013)“…Process migration involves transferring both static and dynamic states of a process from one machine to another. Migration requires checkpointing the dynamic…”
Get full text
Conference Proceeding -
14
Design and Implementation of a CPU Bound Process Migration in Windows 7
Published in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT) (01-11-2012)“…This paper presents a new mechanism for user-level process migration in a network of homogeneous systems running Windows 7 operating system. The methodology…”
Get full text
Conference Proceeding