
Salah A. Aliesawi- Doctor of Philosophy
- Head of Faculty at University of Anbar
Salah A. Aliesawi
- Doctor of Philosophy
- Head of Faculty at University of Anbar
About
77
Publications
8,485
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
318
Citations
Introduction
Current institution
Publications
Publications (77)
A supervised learning depending on the resilient propagation
neural network (RPROP) procedure has been used to solve the
problem of FTIR charts recognition of the organic materials
by training features extracted from two methods; principal
component analysis (PCA) and discrete wavelet transform
(DWT). During the testing process, it was found that;...
Cultural dimensions play a crucial role in shaping governance structures and corruption dynamics across nations. This study investigates the relationship between Hofstede's cultural dimensions (Masculinity, Power Distance, Individualism, and Uncertainty Avoidance) and two key explanatory variables: Region (Africa, America, Asia, and Europe) and Lev...
This study examines the influence of cultural dimensions on governance and corruption perception, aiming to determine whether nations share more commonalities than differences. Using Hofstede’s six cultural dimensions—Masculinity, Power Distance, Individualism, Uncertainty Avoidance, Long-Term Orientation, and Indulgence—alongside the Corruption Pe...
Cultural dimensions play a crucial role in shaping governance structures and corruption dynamics across nations. This study investigates the relationship between Hofstede’s cultural dimensions (Masculinity, Power Distance, Individualism, and Uncertainty Avoidance) and two key explanatory variables: Region (Africa, America, Asia, and Europe) and Lev...
This study examines the influence of cultural dimensions on governance and corruption perception, aiming to determine whether nations share more commonalities than differences. Using Hofstede's six cultural dimensions-Masculinity, Power Distance, Individualism, Uncertainty Avoidance, Long-Term Orientation, and Indulgence-alongside the Corruption Pe...
This study examines the influence of cultural dimensions on governance and corruption perception, aiming to determine whether nations share more commonalities than differences. Using Hofstede's six cultural dimensions-Masculinity, Power Distance, Individualism, Uncertainty Avoidance, Long-Term Orientation, and Indulgence-alongside the Corruption Pe...
Naturally occurring floods are an essential part of life in many parts of the world. Floods, of all the natural dangers, have the greatest effect on society because they cover large geographic regions, happen often, and have a lasting negative socioeconomic impact. Thus, it becomes necessary to design a comprehensive and successful strategy for pre...
Naturally occurring floods are an essential part of life in many parts of the world. Floods, of all the natural dangers, have the greatest effect on society because they cover large geographic regions, happen often, and have a lasting negative socioeconomic impact. Thus, it becomes necessary to design a comprehensive and successful strategy for pre...
The prediction of proton energy shows a key part in various scientific and technological studies including particle physics, medical imaging, and radiation therapy. In the last years the regression techniques study a lot trying to discover the difficult relationships among proton properties energy, needing to be studying of additional advanced tech...
The Internet of Things (IoT) has been regarded as the most critical technology due to its resource-constrained sensors transmitted via low-power wireless technologies beneath low-power lossy networks (LLNs), where the LLN has high latency and lower throughput due to its traffic patterns. The IoT possesses low-cost and low-power sensor technology, w...
This work presents an extensive dataset comprising images meticulously obtained from diverse geographic locations within Iraq, depicting both healthy and infected fig leaves affected by Ficus leafworm. This particular pest poses a significant threat to economic interests, as its infestations often lead to the defoliation of trees, resulting in redu...
Prostate cancer is a prevalent form of malignancy impacting a substantial male population and ranks among the primary contributors to cancer-related fatalities globally. The utilization of magnetic resonance imaging (MRI) scans for prostate cancer detection has presented significant difficulties. This proposed, explores the use of machine learning...
Skin cancer is considered one of the most fatal illnesses in the human population. Within the current healthcare system, the procedure of identifying skin cancer is time-consuming and poses a potential risk to human life if not recognized promptly. Early identification of skin cancer is imperative to maximize the likelihood of achieving complete re...
Despite the increasing use of the wireless sensor network in many applications, especially critical ones, exploiting the full potential of this network is very difficult due to many challenges. In general, sensor data contains a huge number of redundant data that change the overall network performance. In recent years, a data aggregation scheme pla...
The Magnetic Resonance Images (MRI) the segmentation of brain tumor is quite possibly the most troublesome medical images segmentation and it has many challenges because the tumor has no specific shape or size, not found in a specific place of the brain and contains three sub-areas (Full Tumor FT, Enhanced Tumor ET and Tumor Core TC). The Manual se...
In recent years, WSNs have been considered one of the most sensitive fields of research due to their widespread use in many important and critical applications. However, utilizing the full potential of this network is very hard due to numerous challenges. WSNs face a hurdle in collecting raw data since most of the transmitted data from the sensor n...
Wireless sensor network (WSN) is one of the most promising technologies due to its size, cost-effective nature, and its ability to easily deploy in the target environment, as well as for its entry into many sensitive applications. However, making the most of the potential of this network is very difficult due to many issues, including the data rece...
Road traffic accidents are perceived as a serious problem in societies and one of the main reasons of fatalities, disability and injuries that inflict humans all over the world. Most of the Vehicular Ad Hoc Networks (VANETs) supported safety applications mainly rely on transmitting safety messages either by the means of vehicles or Road-Side Units...
Voiceprint Recognition (VPR) is the mechanism by which a user’s so-called identity is determined using characteristics taken from their voice, where this-technique is one of the world’s most useful and common biometric recognition techniques particularly the fields-relevant to security. These can be used for authentication, monitoring, forensic ide...
Wireless sensor networks are considered one of the most important applications in mobile computing and networking. These networks play an important role in our daily life. However, wireless sensor networks have a lot of vital purposes in modern technology , such as scientific research, rescue operations, and scientific discoveries. The energy power...
Wireless sensor networks are considered one of the most important applications in mobile computing and networking. These networks play an important role in our daily life. However, wireless sensor networks have a lot of vital purposes in modern technology , such as scientific research, rescue operations, and scientific discoveries. The energy power...
In Wireless Sensor Networks (WSNs), energy saving is one of the most essential issues in designing because of the significant restricted power resources of the Sensor Nodes (SNs). Moreover, these nodes are deployed in remote or hostile environments. Clustering techniques gained widespread acceptance due to its characteristic of less energy exhausti...
In this paper, a prototype of drowsiness detection system is developed to reduce car accidents and save drivers' life. In such real-time system, the state of driver' eyes is taken continuously and sending alert if required. A low cost system for detecting a drowsy condition of a driver of a vehicle includes a video imaging camera located in front o...
Internet of Things (IoT) is a network of enormous things that are connected together for data communication. Therefore, IoT objects require an efficient technique for data communication. When transmitter power efficiency and performance improvement are of paramount importance, linear precoded orthogonal frequency division (LP- OFDM) is considered a...
The electronic-passport is majorly used in worldwide. Many countries have started changing their conventional passports to electronic-passports due to upgraded security of the passport holder. Passports and any document probably enhanced using recent technology advancements - Radio Frequency Identification (RFID) technology for e-passports. The e-P...
The Vehicular Ad-hoc Network or VANET is a special breed of Mobile Ad-hoc Networks (MANETs), that is used as a communication technology by the vehicles on roads to create a mobile network. VANETs have countless benefits and has tremendous potential to im-prove road safety, traffic efficiency, with added convenience and conform both for drivers and...
The advances recently seen in data compression, and communication systems, have made it viable to design wireless image transmission systems. For many applications such as confidential transmission, military and medical applications, data encryption techniques should be also used to protect the confidential data from intruders. For these applicatio...
In network-based technology like multimedia applications, different encryption techniques are used to protect the confidential data from unauthorized access and provide highly secured data transmission. Due to the large data size and high correlation between pixels, special encryption techniques are used for digital images instead of traditional ci...
Vehicular ad-hoc network (VANET) considers as a promising technology to support the communication between vehicles, and between vehicles and road side units. A reliable routing algorithm for such networks is challenging task because of high mobility and periodic changes of the network topology. To improve the performance of ad-hoc on demand vector...
Conservation of energy is one major issue in the deployment of Wireless Sensor Networks (WSNs). The power resources of the sensor nodes are significantly restricted and these nodes are deployed in remote places. Communication protocols must be designed carefully in order to achieve the efficient utilization of the limited energy of sensor nodes. Cl...
The advances recently seen in data compression, and communication systems, have made it viable to design wireless image transmission systems. For many applications such as confidential transmission, military and medical applications, data encryption techniques should be also used to protect the confidential data from intruders. For these applicatio...
In this paper, a source and channel coding scheme is proposed for lossy video transmission over wireless channels. The source coding is used to reduce the redundancy so that the bit streams/video can be stored or sent efficiently over a network. The block-Matching (BM) with Quintet Search (QS) algorithm for motion estimation (ME) uses as a source c...
In this paper, a simple hybrid lossy image compression system is proposed, it is based on combining effective techniques, starts by wavelet transform that decompose the image signal followed by polynomial approximation model of linear based to compressed approximation image band. The error caused by applying polynonial approximation is coded using...
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction w...
In wireless broadband comms using single-carrier interleave division multiple access
(SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid
decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and
interference cancellation (IC) techniques, are proposed in conjunction with chann...
In this paper, a simple hybrid lossy image compression system is proposed, it is based on combining
effective techniques, starts by wavelet transform that decompose the image signal followed by polynomial
approximation model of linear based to compressed approximation image band. The error caused by applying
polynonial approximation is coded using...
Thi s paper demonstrates the effect of color image transmission through AWGN channel using binary phase shift key modulation (BPSK) system and transmission of compressed color image through AWGN. On the other hand, the transmission consumes a large amount of channel and needs the processing, therefore utilizes compression techniques to reduce the s...
The high sensitivity of multicarriers systems to the channel estimation errors, transceiver oscillators mismatch and/or Doppler effect has received a considerable attention in the recent studies. In this work, a new two semi-blind and data-Aided techniques are proposed to achieve an accurate carrier frequency offset (CFO) and flat fading channel es...
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) with frequency domain equalization (FDE), a new combination of iterative block decision feedback equalization (IBDFE) and interference cancellation (IC) techniques is proposed to deal with several users accessing the common channel. Filtering ope...
Multi-user spread-spectrum techniques are increasingly being considered for communications in underwater acoustic channels, which vary from stationary with sparse arrivals to rapidly varying channels. Downlink adaptive multiuser architectures, direct form interference cancellation IC-IDMA and separate channel estimation (CE) based Rake IDMA receive...
Two adaptive receivers for jointly detecting active users in an interleave division multiple access (IDMA) system are considered for highly dispersive underwater acoustic channels (UACs) using a continuous pilot approach. A direct adaptive interference cancellation (IC) IDMA receiver is proposed and compared with the standard Rake-IDMA receiver tha...
In this paper, turbo multiuser detectors in Interleave Division Multiple Access (IDMA) based systems are considered for short range underwater acoustic channels (UACs). In such long reverberant channels that demand high computational complexity, turbo detectors based on minimum mean square error (MMSE) criterion are an attractive solution to achiev...
Spread spectrum techniques have been used for many cellular communication systems, and are being adopted widely for military communication networks. The motivation for employing this technique is its ability to suppress fading due to multipath propagation. In this paper, receivers based on chip level equalization are considered for a downlink code...
Two promising single-element downlink interleave division multiple access (IDMA) receivers, employing adaptive decision feedback equalization and soft Rake-based IDMA structures, are proposed for multi-user underwater communications applications. A Chip level DFE-based receiver is optimized using the mean square error criterion (MSE), which is gene...
Two different single-element synchronous downlink multiple access schemes, interleave division multiple access (IDMA) and code division multiple access (CDMA) in conjunction with channel estimation, are considered for underwater communications channels. The proposed hard/soft chip channel estimation and carrier phase tracking are jointly optimized...
A single-element downlink interleave division multiple access (IDMA) receiver employing adaptive chip-level decision feedback equalization (DFE) is considered for multiuser communications over frequency selective channels. A continuous pilot based adaptive DFE, which is suitable for fast mul-tipath fading channels, is optimized based on the mean sq...
Two single-element downlink interleave division multiple access (IDMA) based receivers employing adaptive decision feedback equalization (DFE) and conventional soft Rake are proposed for multi-user underwater communications channels. The chip-level DFE is optimized using time-multiplexed training based on the mean square error criterion (MSE), whic...