Preferred Language
Articles
/
alkej-124
Energy Consumption Analyzing in Single hop Transmission and Multi-hop Transmission for using Wireless Sensor Networks
...Show More Authors

Wireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). The simulation results showed how the multi-hop protocol was more energy efficient than single hop protocol.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks
...Show More Authors

Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Wed Apr 01 2009
Journal Name
2009 Ieee Wireless Communications And Networking Conference
Power Efficiency Maximization in Cognitive Radio Networks
...Show More Authors

Cognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi

... Show More
View Publication
Scopus (16)
Crossref (10)
Scopus Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Planning of Distribution Networks in Baghdad City
...Show More Authors

Planning of electrical distribution networks is considered of highest priority at the present time in Iraq, due to the huge increase in electrical demand and expansions imposed on distribution networks as a result of the great and rapid urban development.

Distribution system planning simulates and studies the behavior of electrical distribution networks under different operating conditions. The study provide understanding of the existing system and to prepare a short term development plan or a long term plan used to guide system expansion and future investments needed for improved network performance.

The objective of this research is the planning of Al_Bayaa 11 kV distribution network in Baghdad city bas

... Show More
View Publication Preview PDF
Publication Date
Wed May 11 2022
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Some Methods For A single Imputed A missing Observation In Estimating Nonparametric Regression Function
...Show More Authors

In this paper, we will study non parametric model when the response variable have missing data (non response) in observations it under missing mechanisms MCAR, then we suggest Kernel-Based Non-Parametric Single-Imputation instead of missing value and compare it with Nearest Neighbor Imputation by using the simulation about some difference models and with difference cases as the sample size, variance and rate of missing data.      

View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Physics
Producing Hydrogen Energy Using Cr2O3-TNFs Nanocomposite with Animal (Chitosan) Extract via Ultrasonic and Hydrothermal Techniques
...Show More Authors

In this study, an efficient photocatalyst for dissociation of water was prepared and studied. The chromium oxide (Cr2O3) with Titanium dioxide (TiO2) nanofibers (Cr2O3-TNFs) nanocomposite with (chitosan extract) were synthesized using ecologically friendly methods such as ultrasonic and hydrothermal techniques; such TiO2 exhibits nanofibers (TNFs) shape struct

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
The efficiency of cluster analysis to analyzing medical image of Covid-19 patient by using K-means algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
A Comparative Analysis of the Zernike Moments for Single Object Retrieval
...Show More Authors

Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s

... Show More
View Publication Preview PDF
Crossref (2)
Clarivate Crossref