The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming model (MILP) and then we used a heuristic to solve the time complexity problem. The results obtained in the simulation results indicate the optimal performance of the proposed scheme in terms of energy consumption and the number of used UAVs.
Database is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show MoreKnowledge of the distribution of the rock mechanical properties along the depth of the wells is an important task for many applications related to reservoir geomechanics. Such these applications are wellbore stability analysis, hydraulic fracturing, reservoir compaction and subsidence, sand production, and fault reactivation. A major challenge with determining the rock mechanical properties is that they are not directly measured at the wellbore. They can be only sampled at well location using rock testing. Furthermore, the core analysis provides discrete data measurements for specific depth as well as it is often available only for a few wells in a field of interest. This study presents a methodology to generate synthetic-geomechani
... Show MoreA poetic vision appeared in the poem of Al-Abbas bin Mardas Al-Sulami. He lived in the eras of pre-Islamic times and the emergence of Islam. The focus of this research: is the study of poetic text in the pre-Islamic era and the era of early Islam. The research followed a method in treating poetic texts, as it is based on presenting poetic texts from the collection of Al-Abbas bin Mardas, explaining the features of his poetic vision, and examining all the external factors that surrounded the poet and influenced his vision and all his thoughts. The results of this research was that Al-Abbas Ibn Mardas revealed some of the positions that he found contradicted the authentic Arab value before the advent of Islam, and the poet Abbas bin Mardas tr
... Show MoreThe present study deals with the websites of Iraqi political parties on the internet to identify the effectiveness in providing communicative applications that help audience to participate, express their opinions, their positions, and other aspects reflecting the extent of employing modern technological tools to allow opportunities for political, and democratic participation since the internet has become an effective tool for political communications of political parties. The research sample includes eight political parties. The research concludes that the Iraqi political parties do not employ interactive communication patterns to reflect their interests in communicating with the public, providing opportunities for their participation an
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show More The current research aims to: (know the effectiveness of the harvesting strategy in the achievement of the students of the Institute of Fine Arts in environmental art.
- In order to know this effectiveness, the researcher put a main zero hypothesis and derived six sub-hypotheses from it. the usual way; As the research community reached (120) male and female students of the Fine Arts Institutes for the morning study in Baghdad. As for the research sample, it was chosen by the simple random method, and the number was (75) male and female students for the year 2021-2022 AD. The researcher applied a pre-knowledge test for the four groups of research to find out the level of previous experiences of students in the subject of environmen
In Automatic Speech Recognition (ASR) the non-linear data projection provided by a one hidden layer Multilayer Perceptron (MLP), trained to recognize phonemes, and has previous experiments to provide feature enhancement substantially increased ASR performance, especially in noise. Previous attempts to apply an analogous approach to speaker identification have not succeeded in improving performance, except by combining MLP processed features with other features. We present test results for the TIMIT database which show that the advantage of MLP preprocessing for open set speaker identification increases with the number of speakers used to train the MLP and that improved identification is obtained as this number increases beyond sixty.
... Show MoreUnconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria. Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core. Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um
... Show More