Preferred Language
Articles
/
bsj-46
Optimal UAV Deployment for Data Collection in Deadline-based IoT Applications
...Show More Authors

The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming model (MILP) and then we used a heuristic to solve the time complexity problem. The results obtained in the simulation results indicate the optimal performance of the proposed scheme in terms of energy consumption and the number of used UAVs.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2024
Journal Name
Iraqi Journal Of Physics
Synthesis of PPy-MnO2 Nanocomposite for Utilization in Supercapacitor Applications
...Show More Authors

Polypyrrole (PPy) nanocomposites were prepared using chemical oxidation and were combined with manganese oxide (MnO2) nanoparticles. The PPY-MnO2 nanocomposite was synthesized by integrating PPy nanofibers with varying volume ratio percentages of MnO2 dopant (10, 30, and 50% vol. ratio). The structural features of the PPy and PPy-MnO2 nanocomposite were investigated using X-ray diffraction (XRD).  Fourier transfor infrared (FTIR) spectroscopy was used to demonstrate the molecular structures of primary materials and the final product of PPy, MnO2, and PPy- MnO2 nanocomposites. Field Emission Scanning Electron Microscopy (FESEM) showed that the morphology of PPy consisted of a network of nanofibers. Increasing the volume ratios of ma

... Show More
View Publication
Crossref
Publication Date
Wed May 09 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
New Techniques to Enhance Data Deduplication using Content based-TTTD Chunking Algorithm
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Crossref
Publication Date
Mon Sep 03 2012
Journal Name
The International Archives Of The Photogrammetry, Remote Sensing And Spatial Information Sciences
CALIBRATION OF FULL-WAVEFORM ALS DATA BASED ON ROBUST INCIDENCE ANGLE ESTIMATION
...Show More Authors

Abstract. Full-waveform airborne laser scanning data has shown its potential to enhance available segmentation and classification approaches through the additional information it can provide. However, this additional information is unable to directly provide a valid physical representation of surface features due to many variables affecting the backscattered energy during travel between the sensor and the target. Effectively, this delivers a mis-match between signals from overlapping flightlines. Therefore direct use of this information is not recommended without the adoption of a comprehensive radiometric calibration strategy that accounts for all these effects. This paper presents a practical and reliable radiometric calibration r

... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Stability testing of time series data for CT Large industrial establishments in Iraq
...Show More Authors

Abstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of ​​cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.

Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 24 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
FOOD APPLICATIONS FOR OIL AND CHIA SEEDS SALVIA HISPANICA: FOOD APPLICATIONS FOR OIL AND CHIA SEEDS SALVIA HISPANICA
...Show More Authors

The extracted oil from the Chia seeds white and black were used in the manufacture of certain foods such as mayonnaise. The results of the sensory evaluation showed that the product was acceptable except for the flavor of white chia seed oil. The seeds were fully used in the manufacture of the nutella. The results of the sensory evaluation were encouraging the use of the extracted oil from the black chia seeds in the production of the nutella except the spread property. Chia seeds were also used in the manufacture of pudding. The results of the sensory evaluation showed an excellent and acceptable product of black chia seeds oil can be obtained, while the white seeds did not receive the acceptance in terms of color and flavor.

View Publication Preview PDF
Publication Date
Wed Dec 20 2017
Journal Name
New Visions In Plant Science
Improving Nitrogen and Phosphorus Efficiency for Optimal Plant Growth and Yield
...Show More Authors

Nitrogen (N) and phosphorus (P) are the most important nutrients for crop production. The N contributes to the structural component, generic, and metabolic compounds in a plant cell. N is mainly an essential part of chlorophyll, the compound in the plants that is responsible for photosynthesis process. The plant can get its available nitrogen from the soil by mineralizing organic materials, fixed-N by bacteria, and nitrogen can be released from plant as residue decay. Soil minerals do not release an enough amount of nitrogen to support plant; therefore, fertilizing is necessary for high production. Phosphorous contributes in the complex of the nucleic acid structure of plants. The nucleic acid is essential in protein synthesis regulation; t

... Show More
View Publication
Publication Date
Fri Apr 28 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Design Optimal Neural Network for Solving Unsteady State Confined Aquifer Problem
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Computers And Electronics In Agriculture
Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation: A case study in Iraq
...Show More Authors

View Publication
Crossref (112)
Crossref