Salah A. Aliesawi

Salah A. Aliesawi
  • Doctor of Philosophy
  • Head of Faculty at University of Anbar

About

77
Publications
8,485
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
318
Citations
Current institution
University of Anbar
Current position
  • Head of Faculty

Publications

Publications (77)
Article
Full-text available
A supervised learning depending on the resilient propagation neural network (RPROP) procedure has been used to solve the problem of FTIR charts recognition of the organic materials by training features extracted from two methods; principal component analysis (PCA) and discrete wavelet transform (DWT). During the testing process, it was found that;...
Article
Full-text available
Cultural dimensions play a crucial role in shaping governance structures and corruption dynamics across nations. This study investigates the relationship between Hofstede's cultural dimensions (Masculinity, Power Distance, Individualism, and Uncertainty Avoidance) and two key explanatory variables: Region (Africa, America, Asia, and Europe) and Lev...
Preprint
This study examines the influence of cultural dimensions on governance and corruption perception, aiming to determine whether nations share more commonalities than differences. Using Hofstede’s six cultural dimensions—Masculinity, Power Distance, Individualism, Uncertainty Avoidance, Long-Term Orientation, and Indulgence—alongside the Corruption Pe...
Preprint
Cultural dimensions play a crucial role in shaping governance structures and corruption dynamics across nations. This study investigates the relationship between Hofstede’s cultural dimensions (Masculinity, Power Distance, Individualism, and Uncertainty Avoidance) and two key explanatory variables: Region (Africa, America, Asia, and Europe) and Lev...
Article
Full-text available
This study examines the influence of cultural dimensions on governance and corruption perception, aiming to determine whether nations share more commonalities than differences. Using Hofstede's six cultural dimensions-Masculinity, Power Distance, Individualism, Uncertainty Avoidance, Long-Term Orientation, and Indulgence-alongside the Corruption Pe...
Article
Full-text available
This study examines the influence of cultural dimensions on governance and corruption perception, aiming to determine whether nations share more commonalities than differences. Using Hofstede's six cultural dimensions-Masculinity, Power Distance, Individualism, Uncertainty Avoidance, Long-Term Orientation, and Indulgence-alongside the Corruption Pe...
Article
Full-text available
Naturally occurring floods are an essential part of life in many parts of the world. Floods, of all the natural dangers, have the greatest effect on society because they cover large geographic regions, happen often, and have a lasting negative socioeconomic impact. Thus, it becomes necessary to design a comprehensive and successful strategy for pre...
Article
Full-text available
Naturally occurring floods are an essential part of life in many parts of the world. Floods, of all the natural dangers, have the greatest effect on society because they cover large geographic regions, happen often, and have a lasting negative socioeconomic impact. Thus, it becomes necessary to design a comprehensive and successful strategy for pre...
Conference Paper
Full-text available
The prediction of proton energy shows a key part in various scientific and technological studies including particle physics, medical imaging, and radiation therapy. In the last years the regression techniques study a lot trying to discover the difficult relationships among proton properties energy, needing to be studying of additional advanced tech...
Conference Paper
Full-text available
The Internet of Things (IoT) has been regarded as the most critical technology due to its resource-constrained sensors transmitted via low-power wireless technologies beneath low-power lossy networks (LLNs), where the LLN has high latency and lower throughput due to its traffic patterns. The IoT possesses low-cost and low-power sensor technology, w...
Article
This work presents an extensive dataset comprising images meticulously obtained from diverse geographic locations within Iraq, depicting both healthy and infected fig leaves affected by Ficus leafworm. This particular pest poses a significant threat to economic interests, as its infestations often lead to the defoliation of trees, resulting in redu...
Conference Paper
Prostate cancer is a prevalent form of malignancy impacting a substantial male population and ranks among the primary contributors to cancer-related fatalities globally. The utilization of magnetic resonance imaging (MRI) scans for prostate cancer detection has presented significant difficulties. This proposed, explores the use of machine learning...
Conference Paper
Skin cancer is considered one of the most fatal illnesses in the human population. Within the current healthcare system, the procedure of identifying skin cancer is time-consuming and poses a potential risk to human life if not recognized promptly. Early identification of skin cancer is imperative to maximize the likelihood of achieving complete re...
Conference Paper
Despite the increasing use of the wireless sensor network in many applications, especially critical ones, exploiting the full potential of this network is very difficult due to many challenges. In general, sensor data contains a huge number of redundant data that change the overall network performance. In recent years, a data aggregation scheme pla...
Conference Paper
The Magnetic Resonance Images (MRI) the segmentation of brain tumor is quite possibly the most troublesome medical images segmentation and it has many challenges because the tumor has no specific shape or size, not found in a specific place of the brain and contains three sub-areas (Full Tumor FT, Enhanced Tumor ET and Tumor Core TC). The Manual se...
Chapter
In recent years, WSNs have been considered one of the most sensitive fields of research due to their widespread use in many important and critical applications. However, utilizing the full potential of this network is very hard due to numerous challenges. WSNs face a hurdle in collecting raw data since most of the transmitted data from the sensor n...
Article
Full-text available
Wireless sensor network (WSN) is one of the most promising technologies due to its size, cost-effective nature, and its ability to easily deploy in the target environment, as well as for its entry into many sensitive applications. However, making the most of the potential of this network is very difficult due to many issues, including the data rece...
Article
Full-text available
Road traffic accidents are perceived as a serious problem in societies and one of the main reasons of fatalities, disability and injuries that inflict humans all over the world. Most of the Vehicular Ad Hoc Networks (VANETs) supported safety applications mainly rely on transmitting safety messages either by the means of vehicles or Road-Side Units...
Article
Full-text available
Voiceprint Recognition (VPR) is the mechanism by which a user’s so-called identity is determined using characteristics taken from their voice, where this-technique is one of the world’s most useful and common biometric recognition techniques particularly the fields-relevant to security. These can be used for authentication, monitoring, forensic ide...
Article
Full-text available
Wireless sensor networks are considered one of the most important applications in mobile computing and networking. These networks play an important role in our daily life. However, wireless sensor networks have a lot of vital purposes in modern technology , such as scientific research, rescue operations, and scientific discoveries. The energy power...
Article
Full-text available
Wireless sensor networks are considered one of the most important applications in mobile computing and networking. These networks play an important role in our daily life. However, wireless sensor networks have a lot of vital purposes in modern technology , such as scientific research, rescue operations, and scientific discoveries. The energy power...
Article
Full-text available
In Wireless Sensor Networks (WSNs), energy saving is one of the most essential issues in designing because of the significant restricted power resources of the Sensor Nodes (SNs). Moreover, these nodes are deployed in remote or hostile environments. Clustering techniques gained widespread acceptance due to its characteristic of less energy exhausti...
Article
Full-text available
In this paper, a prototype of drowsiness detection system is developed to reduce car accidents and save drivers' life. In such real-time system, the state of driver' eyes is taken continuously and sending alert if required. A low cost system for detecting a drowsy condition of a driver of a vehicle includes a video imaging camera located in front o...
Article
Internet of Things (IoT) is a network of enormous things that are connected together for data communication. Therefore, IoT objects require an efficient technique for data communication. When transmitter power efficiency and performance improvement are of paramount importance, linear precoded orthogonal frequency division (LP- OFDM) is considered a...
Article
The electronic-passport is majorly used in worldwide. Many countries have started changing their conventional passports to electronic-passports due to upgraded security of the passport holder. Passports and any document probably enhanced using recent technology advancements - Radio Frequency Identification (RFID) technology for e-passports. The e-P...
Article
Full-text available
The Vehicular Ad-hoc Network or VANET is a special breed of Mobile Ad-hoc Networks (MANETs), that is used as a communication technology by the vehicles on roads to create a mobile network. VANETs have countless benefits and has tremendous potential to im-prove road safety, traffic efficiency, with added convenience and conform both for drivers and...
Article
Full-text available
The advances recently seen in data compression, and communication systems, have made it viable to design wireless image transmission systems. For many applications such as confidential transmission, military and medical applications, data encryption techniques should be also used to protect the confidential data from intruders. For these applicatio...
Article
Full-text available
In network-based technology like multimedia applications, different encryption techniques are used to protect the confidential data from unauthorized access and provide highly secured data transmission. Due to the large data size and high correlation between pixels, special encryption techniques are used for digital images instead of traditional ci...
Article
Full-text available
Vehicular ad-hoc network (VANET) considers as a promising technology to support the communication between vehicles, and between vehicles and road side units. A reliable routing algorithm for such networks is challenging task because of high mobility and periodic changes of the network topology. To improve the performance of ad-hoc on demand vector...
Article
Conservation of energy is one major issue in the deployment of Wireless Sensor Networks (WSNs). The power resources of the sensor nodes are significantly restricted and these nodes are deployed in remote places. Communication protocols must be designed carefully in order to achieve the efficient utilization of the limited energy of sensor nodes. Cl...
Article
Full-text available
The advances recently seen in data compression, and communication systems, have made it viable to design wireless image transmission systems. For many applications such as confidential transmission, military and medical applications, data encryption techniques should be also used to protect the confidential data from intruders. For these applicatio...
Article
Full-text available
In this paper, a source and channel coding scheme is proposed for lossy video transmission over wireless channels. The source coding is used to reduce the redundancy so that the bit streams/video can be stored or sent efficiently over a network. The block-Matching (BM) with Quintet Search (QS) algorithm for motion estimation (ME) uses as a source c...
Article
Full-text available
In this paper, a simple hybrid lossy image compression system is proposed, it is based on combining effective techniques, starts by wavelet transform that decompose the image signal followed by polynomial approximation model of linear based to compressed approximation image band. The error caused by applying polynonial approximation is coded using...
Article
Full-text available
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction w...
Article
Full-text available
In wireless broadband comms using single-carrier interleave division multiple access (SC-IDMA) systems, efficient multiuser detection (MUD) classes that make use of joint hybrid decision feedback equalization (HDFE)/ frequency decision-feedback equalization (FDFE) and interference cancellation (IC) techniques, are proposed in conjunction with chann...
Article
Full-text available
In this paper, a simple hybrid lossy image compression system is proposed, it is based on combining effective techniques, starts by wavelet transform that decompose the image signal followed by polynomial approximation model of linear based to compressed approximation image band. The error caused by applying polynonial approximation is coded using...
Article
Full-text available
Thi s paper demonstrates the effect of color image transmission through AWGN channel using binary phase shift key modulation (BPSK) system and transmission of compressed color image through AWGN. On the other hand, the transmission consumes a large amount of channel and needs the processing, therefore utilizes compression techniques to reduce the s...
Article
Full-text available
The high sensitivity of multicarriers systems to the channel estimation errors, transceiver oscillators mismatch and/or Doppler effect has received a considerable attention in the recent studies. In this work, a new two semi-blind and data-Aided techniques are proposed to achieve an accurate carrier frequency offset (CFO) and flat fading channel es...
Article
Full-text available
In wireless broadband communications using single-carrier interleave division multiple access (SC-IDMA) with frequency domain equalization (FDE), a new combination of iterative block decision feedback equalization (IBDFE) and interference cancellation (IC) techniques is proposed to deal with several users accessing the common channel. Filtering ope...
Conference Paper
Full-text available
Multi-user spread-spectrum techniques are increasingly being considered for communications in underwater acoustic channels, which vary from stationary with sparse arrivals to rapidly varying channels. Downlink adaptive multiuser architectures, direct form interference cancellation IC-IDMA and separate channel estimation (CE) based Rake IDMA receive...
Conference Paper
Full-text available
Two adaptive receivers for jointly detecting active users in an interleave division multiple access (IDMA) system are considered for highly dispersive underwater acoustic channels (UACs) using a continuous pilot approach. A direct adaptive interference cancellation (IC) IDMA receiver is proposed and compared with the standard Rake-IDMA receiver tha...
Article
Full-text available
In this paper, turbo multiuser detectors in Interleave Division Multiple Access (IDMA) based systems are considered for short range underwater acoustic channels (UACs). In such long reverberant channels that demand high computational complexity, turbo detectors based on minimum mean square error (MMSE) criterion are an attractive solution to achiev...
Conference Paper
Full-text available
Spread spectrum techniques have been used for many cellular communication systems, and are being adopted widely for military communication networks. The motivation for employing this technique is its ability to suppress fading due to multipath propagation. In this paper, receivers based on chip level equalization are considered for a downlink code...
Conference Paper
Full-text available
Two promising single-element downlink interleave division multiple access (IDMA) receivers, employing adaptive decision feedback equalization and soft Rake-based IDMA structures, are proposed for multi-user underwater communications applications. A Chip level DFE-based receiver is optimized using the mean square error criterion (MSE), which is gene...
Conference Paper
Full-text available
Two different single-element synchronous downlink multiple access schemes, interleave division multiple access (IDMA) and code division multiple access (CDMA) in conjunction with channel estimation, are considered for underwater communications channels. The proposed hard/soft chip channel estimation and carrier phase tracking are jointly optimized...
Conference Paper
Full-text available
A single-element downlink interleave division multiple access (IDMA) receiver employing adaptive chip-level decision feedback equalization (DFE) is considered for multiuser communications over frequency selective channels. A continuous pilot based adaptive DFE, which is suitable for fast mul-tipath fading channels, is optimized based on the mean sq...
Conference Paper
Full-text available
Two single-element downlink interleave division multiple access (IDMA) based receivers employing adaptive decision feedback equalization (DFE) and conventional soft Rake are proposed for multi-user underwater communications channels. The chip-level DFE is optimized using time-multiplexed training based on the mean square error criterion (MSE), whic...

Network

Cited By