In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication cost. Unlike MSL* which chooses all normal nodes found in the neighbor, the proposed scheme uses set theory to only select intersected nodes. To evaluate our method, we simulate in our proposed scheme the use of the same MSL* settings and simulators. From the simulation, we find out that our proposed scheme is able to reduce communication cost—the number of messages sent—by a minimum of 0.02 and a maximum of 0.30 with an average of 0.18, for varying node densities from 6 to 20, while nonetheless able to retain similar MSL* accuracy rates.
The Mauddud reservoir, Khabaz oil field which is considered one of the main carbonate reservoirs in the north of Iraq. Recognizing carbonate reservoirs represents challenges to engineers because reservoirs almost tend to be tight and overall heterogeneous. The current study concerns with geological modeling of the reservoir is an oil-bearing with the original gas cap. The geological model is establishing for the reservoir by identifying the facies and evaluating the petrophysical properties of this complex reservoir, and calculate the amount of hydrocarbon. When completed the processing of data by IP interactive petrophysics software, and the permeability of a reservoir was calculated using the concept of hydraulic units then, there
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreThis paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show MoreBuilding a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro
... Show MoreGeneral propositions have dealt with various indicators and features that frame and describe basic architectural concepts, and from those concepts, the concept of identity will be presented here, which represents the nerve of intellectual vision of the state of architecture development, transformation and change. Due to its deep intellectual basis, it was necessary to study multiple features, especially the achievement feature that was considered a major stage describing the nature of change and shift related to the achievement of concept and its role in the development of the architectural field . &nb
... Show MoreA niger, a fungus which doesn't have high ability to production lipid, this fungus has been select to investigate the non oleaginicity. In this search, there are explorations about: i) growth profile ii) enzymes profile iii) isoforms. Growth profile shows that this fungus doesn't have ability to accumulate lipid more than 6% while bio mass are around 10g/l in spite of the presence of glucose in the media till the end of cultivation time and excision of nitrogen within 24 hrs. In enzyme study, we investigate all lipogenic enzymes Malic enzyme (ME), Fatty acid synthase (FAS), ATP: Citrate lays (ACL), NAD+ isocitrate dehydrogenase (NAD+ICDH), Glucose-6-phosphate (G6PD), and 6-phosphogluconate dehydrogenase (6PGD), all these enzymes show, ac
... Show MoreThe current work utilizes the peel and pulp of the Iraqi eggplant to remove Alizarin Red S dye (ARS) from an aqueous solution. The isotherms of adsorption were studied and the factors that the effect them: temperature, the effect of surface nature and effect of ionic strength. The isotherms of adsorption of ARS on the peel were found obey the Freundlich, equation, but the isotherms of adsorption on the pulp were found to obey the Langmuir equation. At different temperatures, the adsorption process was studied, and it was found that when the temperature decreased, the adsorption increased. Based on the data we obtained in practice, the thermodynamic functions (∆H, ∆G, ∆S) were calculated as the process was exothermic, spontan
... Show More
