Preferred Language
Articles
/
bsj-5069
Compression-based Data Reduction Technique for IoT Sensor Networks
...Show More Authors

Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the sensor data readings, after which a lossless LZW compression to compress the loss quantization output. Quantizing the sensor node data readings down to the alphabet size of SAX results in lowering, to the advantage of the best compression sizes, which contributes to greater compression from the LZW end of things. Also, another improvement was suggested to the CBDR technique which is to add a Dynamic Transmission (DT-CBDR) to decrease both the total number of data sent to the gateway and the processing required. OMNeT++ simulator along with real sensory data gathered at Intel Lab is used to show the performance of the proposed technique. The simulation experiments illustrate that the proposed CBDR technique provides better performance than the other techniques in the literature.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 08 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Data Analytics and Techniques
...Show More Authors

Big data of different types, such as texts and images, are rapidly generated from the internet and other applications. Dealing with this data using traditional methods is not practical since it is available in various sizes, types, and processing speed requirements. Therefore, data analytics has become an important tool because only meaningful information is analyzed and extracted, which makes it essential for big data applications to analyze and extract useful information. This paper presents several innovative methods that use data analytics techniques to improve the analysis process and data management. Furthermore, this paper discusses how the revolution of data analytics based on artificial intelligence algorithms might provide

... Show More
View Publication
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
The contrast and illumination technique for image capturing under different Tungsten illumination
...Show More Authors

The digital camera which contain light unit inside it is useful with low illumination but not for high. For different intensity; the quality of the image will not stay good but it will have dark or low intensity so we can not change the contrast and the intensity in order to increase the losses information in the bright and the dark regions. . In this search we study the regular illumination on the images using the tungsten light by changing the intensities. The result appears that the tungsten light gives nearly far intensity for the three color bands(RGB) and the illuminated band(L).the result depend on the statistical properties which represented by the voltage ,power and intensities and the effect of this parameter on the digital

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archive
Furrow irrigated raised bed (firb) technique for improving water productivity in Iraq
...Show More Authors

A field experiment was conducted during the agricultural season 2017-2018. In the research station of the Ministry of Agriculture AL Rasheed side, and within the activities and researches of the national program to develop wheat cultivation in Iraq, Two factors were experienced in the cultivation of wheat, The first factor is the method of cultivation of five treatments were used: : Treatment of the cultivation of wheat in the plots (B), Treatment of wheat crops on bed with 50 cm width (S1), 60cm (S2), 70cm (S3) and 80cm (S4), The second factor is irrigation levels depletion of 40, 60 and 80% of available water coded as W1, W2 and W3, respectively, The experiment was designed under randomized complete block design (RCBD) with three replicat

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Sun Jun 09 2019
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Evaluation of Rebamipide Film using Casting Technique for Local Action
...Show More Authors

Abstract

The aim of this study was to prepare rebamipide ocular inserts in order to extend its release on the ocular surface for dry eye treatment. Solubility study was applied to the drug with or without l-arginine using different solvents. Solvent casting technique was used to prepare the inserts; l-arginine was used to solubilize the drug, hydroxypropyl methylcellulose grades (E5 and K15M) and poly ethylene glycol 200 were used as excipients. The inserts were evaluated for their physical and mechanical properties, moisture loss% and absorption %, surface pH, and in-vitro drug release. The use l-arginine exhibited an enhancement of rebamipide solubility in both deionized water and phosphate buffer (pH 7.4) by a

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
أسلوب بيز في تحليل البيانات غير التامة
...Show More Authors

In this paper we will explain ,how use Bayesian procedure in analysis multiple linear regression model with missing data in variables X's  as the new method suggest , and explain some of missing  Patterns under missing mechanism , missing complete at random MCAR and compare Bayesian estimator with complete case estimator by use  simulation procedure .           

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
AGENT BASED MONITORING FOR INVESTIGATION PROCESS AND MAINTENANCE IMPROVEMENT
...Show More Authors

Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref