User profiles for Mohammad Omer
Omer K. Jasim MohammadUniversity of Fallujah Verified email at uofallujah.edu.iq Cited by 242 |
Effective sound detection system in commercial car vehicles using Msp430 launchpad development
In vehicular networks, several automation protocols are invented in artificial intelligence-based
systematic processes. But best of our knowledge, none of the methods discussed …
systematic processes. But best of our knowledge, none of the methods discussed …
Statistical analysis for random bits generation on quantum key distribution
OKJ Mohammad, S Abbas… - … on Cyber Security …, 2014 - ieeexplore.ieee.org
Recently, Quantum cryptography researchers utilize the quantum keys, in order to provide a
more trusted environment for both key distribution and management processes. The …
more trusted environment for both key distribution and management processes. The …
Pandemic covid-19: impact on digital marketing
M Omer - Journal of Contemporary Issues in Business and …, 2021 - eprints.tiu.edu.iq
Covid-19 is the most widely used pandemic in the sector, a leading product in digital and
digital media, including advertising, marketing and marketing. But Covid-1. The effect is mostly …
digital media, including advertising, marketing and marketing. But Covid-1. The effect is mostly …
Recent trends of cloud computing applications and services in medical, educational, financial, library and agricultural disciplines
OKJ Mohammad - Proceedings of the 4th International Conference on …, 2018 - dl.acm.org
Cloud computing is a modern emerging trend in distributed computing technology that is
rapidly gaining popularity in the network communication field. Such network communication is …
rapidly gaining popularity in the network communication field. Such network communication is …
A comparative study between modern encryption algorithms based on cloud computing environment
OKJ Mohammad, S Abbas… - 8th International …, 2013 - ieeexplore.ieee.org
The concept of “cloud computing” is not new, it is undisputable that they have proven a
major commercial success over recent times. Cloud computing is the delivery of computing …
major commercial success over recent times. Cloud computing is the delivery of computing …
[PDF][PDF] CLR: Cloud Linear Regression Environment as a More Effective Resource-Task Scheduling Environment (State-of-the-Art).
ME Seno, OKJ Mohammad… - Int. J. Interact. Mob …, 2022 - academia.edu
The cloud paradigm has swiftly developed, and it is now well known as one of the emerging
technologies that will have a significant influence on technology and society in the next few …
technologies that will have a significant influence on technology and society in the next few …
[HTML][HTML] The life styles causing overweight or obesity: Based on 5 years of experience in two centers in Sulaimani Governorate, Kurdistan Region/Iraq
Background One of the top worldwide health problems is overweight and obesity, Body
weight gain over a number of years could be achieved through cumulative positive energy …
weight gain over a number of years could be achieved through cumulative positive energy …
[HTML][HTML] Estimation of free water-corrected microscopic fractional anisotropy
Water diffusion anisotropy MRI is sensitive to microstructural changes in the brain that are
hallmarks of various neurological conditions. However, conventional metrics like fractional …
hallmarks of various neurological conditions. However, conventional metrics like fractional …
Impacting of the E-Platforms on the 4.0 th Industrial Educational Revolution
AH Ali, OKJ Mohammad - … of the 9th International Conference on …, 2019 - dl.acm.org
Nowadays, the world witnesses a major revolution in the world of communications and
information technology, where technology has been entered into all aspects of social, learning …
information technology, where technology has been entered into all aspects of social, learning …
Innovative Method for enhancing Key generation and management in the AES-algorithm
With the extraordinary maturity of data exchange in network environments and increasing the
attackers capabilities, information security has become the most important process for data …
attackers capabilities, information security has become the most important process for data …