Maryam Ghazi Ali

Maryam Ghazi Ali
  • Master of computer science
  • Al-Muthanna University

About

5
Publications
729
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12
Citations
Introduction
Current institution
Al-Muthanna University
Additional affiliations
September 2016 - present
Al-Muthanna University
Position
  • Lecturer
Education
August 2014 - July 2016
Osmania University
Field of study
  • Computer scince

Publications

Publications (5)
Conference Paper
In this paper, we study the possibility of calculating the thermal loads inside the combustion chamber in blasting combustion, which is important in the engine development process. The differential equations were used and applied in a mathematical model. Through these equations the detonation process was represented in the combustion chamber. A num...
Conference Paper
The rapid annual growth of data flows in large-scale networks does not encourage only hardware improvements in the network, but also the most ideal routing control algorithms. In networks, it is impossible to use central routing control algorithms. The choice of parallel algorithms must be based on the principles of functional efficiency and stabil...
Article
Full-text available
As a result of the growth of data traffic, it is natural that until we reach 2030, the use of wireless data will increase three times more than the use of wired data, and as a result of this, the use of data services in mobile phones is also expected to increase by almost the same percentage. In 2030, the speed of data transmission in mobile phones...
Article
Full-text available
When considering cloud services, you need to start with the basic concept of it, a cloud computing is a model that provides easy access to the network on demand for a collectively used set of custom computing resources(e.g. networks , information storages, servers, services and / or applications) in which the user can quickly use for his own tasks...
Article
Steganography is one of the secure techniques of protecting data inside a cover object. Images are the most popular cover objects for Steganography. It provides secret message between users. The current paper presents an enhanced Most Significant Bit (MSB) technique. In this paper, a Private Domains Approach (PDA) is proposed; each domain consists...

Network

Cited By