
Maryam Ghazi Ali- Master of computer science
- Al-Muthanna University
Maryam Ghazi Ali
- Master of computer science
- Al-Muthanna University
About
5
Publications
729
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
September 2016 - present
Education
August 2014 - July 2016
Publications
Publications (5)
In this paper, we study the possibility of calculating the thermal loads inside the combustion chamber in blasting combustion, which is important in the engine development process. The differential equations were used and applied in a mathematical model. Through these equations the detonation process was represented in the combustion chamber. A num...
The rapid annual growth of data flows in large-scale networks does not encourage only hardware improvements in the network, but also the most ideal routing control algorithms. In networks, it is impossible to use central routing control algorithms. The choice of parallel algorithms must be based on the principles of functional efficiency and stabil...
As a result of the growth of data traffic, it is natural that until we reach 2030, the use of wireless data will increase three times more than the use of wired data, and as a result of this, the use of data services in mobile phones is also expected to increase by almost the same percentage. In 2030, the speed of data transmission in mobile phones...
When considering cloud services, you need to start with the basic concept of it, a cloud computing is a model that provides easy access to the network on demand for a collectively used set of custom computing resources(e.g. networks , information storages, servers, services and / or applications) in which the user can quickly use for his own tasks...
Steganography is one of the secure techniques of protecting data inside a cover object. Images are the most popular cover objects for Steganography. It provides secret message between users. The current paper presents an enhanced Most Significant Bit (MSB) technique. In this paper, a Private Domains Approach (PDA) is proposed; each domain consists...