
Hamid AlasadiUniversity of Basrah · Department of Computer Science
Hamid Alasadi
Prof. in Communication network and Computer Engineering
About
62
Publications
39,523
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
133
Citations
Introduction
Hamid Alasadi currently works at the Department of Computer Science, University of Basrah. Hamid does research in Acoustic Engineering and Engineering. Their current project is 'The polarization effect for the double Brillouin frequency shifter (DBFS)'.
Publications
Publications (62)
A wireless body area network (WBAN) connects separate sensors in many places of the human body, such as clothes, under the skin. WBAN can be used in many domains such as health care, sports, and control system. In this paper, a scheme focused on managing a patient’s health care is presented based on building a WBAN that consists of three components...
Because of the lack of fixed infrastructures, the existence of open media and diverse network topologies, internetworking networks and mobile ad hoc networks (MANET’s), the design of MANET protocols is complicated. In this paper, we propose an evolutionary trust mechanism imitating cognitive processes that uses sensitive information to avoid routin...
Sidelobe Canceller Performance Evaluation using Sample Matrix Inversion algorithm
Present invention in general relates to the field of artificial intelligence and more particularly to an artificial intelligence robotic based system in agriculture for optimization of irrigation.
This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects.
The text provides readers with an overview of cloud computing, beginning with historical perspectives on mainframe computers and early networking protocols, moving to current issues such as security of hardwar...
Abstract The recent trends in wireless network sensor technology are moving towards multimedia applications. Multimedia sensor nodes are difficult to communicate, but communication is necessary. Multimedia service offers both video monitoring and voice over wireless sensor networks. This causes severe problems with usage of data, power, bandwidth,...
As a hopeful computing paradigm, cloud services are obtainable to end users based on pay-as-you-go service. Security is represented one of the vital issues for the extended adoption of cloud computing, with the object of accessing several cloud service providers, applications, and services by using anonymity features to authenticate the user. We pr...
Recently, the concept of DNA has been invested in computing technology in different ways which linking information technology and biological sciences. There are several encryption algorithms based on DNA encoding that has been proposed, which leads to generating a new direction in image encryption. However, the DNA encryption scheme has drawbacks s...
In the information technology era, authentication systems have been developed that use multi-factor authentication to ensure the authorisation of users and administrators. There are many schemes based on factors such as smart cards, biometrics, and token devices. Although these schemes are generally strong, they suffer from several drawbacks such a...
The invention provides a lightweight messaging method for end-to-end intelligent device communication in the Internet of things cloud. in the iot- cloud computing system, the messaging method includes two processes: registration and key negotiation, lightweight secure messaging, with secure key and biometric parameter exchange functions, biological...
In this paper, we propose and demonstrate generated characteristics of a multiwavelength fiber laser based on semiconductor optical amplifier in a nonlinear optical loop mirror with different length of polarization maintaining fiber. The configuration comprises 3-dB optical coupler, semiconductor optical amplifier and, 2 meters and 10 meters of pol...
This paper demonstrates multiwavelength fiber laser employing semiconductor optical amplifier in nonlinear optical loop mirror with polarization controller and polarization maintaining fiber. The configuration consists of a 3-dB coupler, polarization controller and several lengths of polarization maintaining fiber. The results showed a single polar...
People have proposed many data integrity techniques to secure data storage in cloud. The majority of these schemes assume that only the owner of the data can modify their storage in cloud. In recent years, researchers have allowed different cloud users to use integrity assurance for modifying data. As a result, schemes with stronger reality than be...
The environment of the proposed Scan2Pass is described in detail. Confidentiality is provided at the application level in the system to protect user credential in both entities (the user and the server) for preventing brute force and dictionary attacks. A security mechanism is also provided to maintain confidentiality at the transport level. The HT...
Widely deployed web services facilitate and enrich several applications, such as e-commerce, social networks, and online banking. This study proposes an optical challenge-response user authentication system model based on the One Time Password (OTP) principle (Scan2Pass) that use multifactor authentication and leverage a camera equipped mobile phon...
Designing Raman amplifier with high On-Off again and low noise figure is required in in optical communication networks, due to wide and tunable amplification and low nonlinearity. This paper proposes a new configuration design to the single mode fiber Raman amplifier using a multi-objective bat algorithm. The main aim of the proposed method is to p...
Now days, with the remarkable fast development of micro processing devices and communicating technologies, networks, computers, mobile devices and Internet have become very unavoidable, as a result led to the emergence and prevalence of the Internet of Things (IoT). The mobility devices in IoT have entered in all areas of life ranging from a smart...
An introduction to the necessary background information required for understanding the ideas of
authentication system has been elaborated in this paper. It begins with a description of basic concept
of authentication process together with the essential factors required for use in authentication systems.
This is followed by a description of the toke...
The foremost compensations of clustering are the communication of combined information to the base station,
bids scalability for enormous quantity of nodes and lowers down energy depletion. Essentially, clustering could be categorized into centralized grouping, distributed grouping and hybrid grouping. In centralized grouping, the cluster head is i...
In this article, we are introducing some technique of growth Nanowire for Nanostructures for physics, A Nanowire considered as a Nanostructure which is build blocks for the generation of electrons protons neutrons positions and the sensor and also the energy applications. In this project, we are to synthesis and growth of semiconductor nanowire mad...
تعتبر الشبكات العصبیة الاصطناعیة ھي واحدة من اھم تقنیات التكنولوجیا و النمذجة المفاھیمیة
المتقدمة الأكثر نجاحا في العقدین الماضیین والتي استخدمت على نطاق واسع في مجموعة
كبیرة ومتنوعة من التطبیقات ، مثل تشخیص الامراض. الأخطاء الطبیة والنتائج الغیر مرغوب
فیھا ھي من اھم أسباب الحاجة إلى نظم التشخیص الغیر تقلیدیة ونظم المعلومات المحوسبة والتي
اصبحت وسی...
The oriented of this book is mainly to the academic researchers and
students. It provides a comprehensive introduction to computational
models of new Swarm Intelligence, in the world of artificial intelligence, a
field that emerged from the biological research. The book illustrates
mathematical models and MATLAB simulation to mimic the organisms’
b...
A wireless sensor node is poised by a sensor, processor, confined memory, transceiver and a low-powered battery. To lessen the data communication period and energy intake, the sensor nodes are accumulated into a quantity of minute clutches denoted as clusters and the occurrence is mentioned as clustering. Essentially, clustering could be categorize...
Grouping could be categorized into centralized grouping, distributed grouping and hybrid grouping. In centralized grouping, the cluster head is immovable. The rest of the sensor nodes in the cluster deed as member nodes. In distributed grouping, the cluster head is not immobile. The cluster head retains on fluctuating form node to node inside the c...
The change in worldwide telecommunications traffic from analogue signals to digital signals has lowered the cost of communication services.
The limiting factors in designing optical telecommunication systems, namely, optical fiber attenuation loss and optical fiber nonlinear effects, especially inelastic nonlinear effects, have not been fully analyzed and understood despite a rich collection of literature dealing with fiber nonlinearities and their effects on fiber optic communication...
المقدمة
البرمجة الكيانية هي طريقة طبيعية للتفكير بالعالم من حولنا ولكتابة برامج للكومبيوتر. فالتوجه الكينوني عبارة عن مدرسة فكرية مشتقة من الواقع لتفعيل الأنشطة الحياتية, فهو أسلوب تفكير بالمفهوم الواقعي يمكننا بإتباعه استنباط طرائق وآليات وأدوات فاعلة في فهم الواقع وتذليل تعاملنا معه. فالتصميم الكائني المنحى Object Oriented Design (OOD) يجهزنا بط...
Clustering is a blooming topology control methodology, which can extend the lifetime and upturn
scalability for wireless sensor networks. The admired principles for clustering procedure are to select cluster
heads with additional residual energy and to interchange them occasionally. Sensors at substantial traffic
locations swiftly exhaust their ene...
Spin Eigenvalue for n-th number of electrons Clebsch–Gordan Matrix
The aim of this paper is to give model to evaluate Diabetes Medical Sites (DMSs) quality by fuzzy system to arrange these sites according to their quality depending on the values that get it during the application of the model on these sites. This model contain the most important element suggested for quality criteria like the Design Site, Update S...
We have developed a theoretical model that analytically predicts the nonlinear phase shift, which is due to Stimulated Brillouin Scattering (SBS) in two different types of optical fibers, a Standard Single-mode fiber (SMF) and a conventional Dispersion Compensating (DCF) fibre. Theoretical analysis based on the SBS effect yields a good description...
In this paper, we present an Artificial Fish Swarm Algorithm is a class of an evolutionary optimization technique with three types of classifier combinations using different geometrics' shape for the recognition of the plant leaves. Fish Swarm Algorithm is applied on Fourier descriptors to get optimum weights that maximize the recognition rate. Fou...
In this paper, speaker recognition system is optimized based on one of Swarm Intelligence Algorithm called Modified Shuffle Frog Leaping Algorithm (MSFLA) with Cepstral analysis and the Mel Frequency Cepstral Coefficients (MFCC) feature extraction approach. In this algorithm Search has been applied on speaker recognition systems and voice. Thus by...
In this paper, we perform the experiment evaluation and the optimization of forward pumped fiber Raman amplifiers. The pumping configuration characteristics and optimum single mode large-effective-area fiber lengths for the system are presented within the framework of the undepleted pump approximation. It is found that achievable optimal span lengt...
In this paper, we perform the experiment evaluation and the optimization of forward pumped fiber Raman amplifiers. The pumping configuration characteristics and optimum single mode large-effective-area fiber lengths for the system are presented within the framework of the undepleted pump approximation. It is found that achievable optimal span lengt...
Particle swarm optimization modelling for ring cavity Brillouin fibre laser (BFL) was developed and analysed, based on the use of stimulated Brillouin scattering. We demonstrate the utility of this modelling by applying it to the performance optimization of BFL for 11 km dispersion shifted fibre (DCF) length, using an optical circulator and an opti...
This manuscript presents a method for off-line handwritten isolated Arabic alphabets recognition using Efficient Technique Fuzzy logic (FL). This method has been avoided the segmentation operation to recognition the alphabets. At first, several shape for every handwritten isolated Arabic alphabet which is stored in square arrays. The alphabet to be...
We present a theoretical analysis of an additional nonlinear phase shift
of backward Stokes wave based on stimulated Brillouin scattering in the
system with a bi-directional pumping scheme. We optimize three
parameters of the system: the numerical aperture, the optical loss and
the pumping wavelength to minimize an additional nonlinear phase shift...
This paper details a theoretical modeling of Brillouin ring fiber laser which incorporates the interaction between multiple Brillouin Stokes signals. The ring cavity was pumped at several Brillouin pump (BP) powers and the output was measured through an optical coupler with various coupling ratios. The first-order Brillouin Stokes signal was satura...
We present a theoretical study of nonlinear phase shift through stimulated Brillouin scattering in single mode optical fiber. Analytical expressions describing the nonlinear phase shift for the pump and Stokes waves in the pump power recycling technique have been derived. The dependence of the nonlinear phase shift on the optical fiber length, the...
Brillouin linewidth has been studied experimentally for single mode large effective area fiber using the co-pumped technique. The Brillouin linewidth with different fiber lengths and it relationship with stimulated Brillouin scattering threshold power are given. Our experimental results indicates that threshold power of stimulated Brillouin scatter...
We implement a particle swarm optimization (PSO) algorithm to characterize stimulated Brillouin scattering phenomena in optical fibers. The explicit and strong dependence of the threshold exponential gain on the numerical aperture, the pump laser wavelength and the optical loss coefficient are presented. The proposed PSO model is also evaluated wit...
We develop a theoretical model that can be used to predict stimulated Brillouin scattering (SBS) threshold in optical fibers that arises through the effect of Brillouin pump recycling technique. Obtained simulation results from our model are in close agreement with our experimental results. The developed model utilizes single mode optical fiber of...
Vertical Cavity Semiconductor Optical Amplifiers (VCSOAs) are attractive components for applications in optical fiber networks and optical switching. This study addresses theoretically the saturation power properties and quantum efficiency characteristics of 1.3 µm Multi Quantum well (MQW) VCSOA, simulation results are presented were fabricated usi...
Questions
Questions (3)
Are there any challenges to be faced in the near future can be addressed in this project?
It’s all strange, yet true – quantum theory is the most accurate scientific theory ever tested and its mathematics is perfectly suited to the weirdness of the atomic world.