Preferred Language
Articles
/
bsj-5948
WOAIP: Wireless Optimization Algorithm for Indoor Placement Based on Binary Particle Swarm Optimization (BPSO)
...Show More Authors

Optimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received signal strength (RSS) measurements simulated using Wireless InSite (WI) software were considered in the test case study by comparing the results collected from WI with the present wireless simulated physical AP deployment of the targeted building - Computer Science Department at University of Baghdad. The performance evaluation of WOAIP shows an increase in terms of AP placement and optimization distinguished in order to increase the wireless coverage ratio to 92.93% compared to 58.5% of present AP coverage (or 24.5% coverage enhancement on average).

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Internal Debt Options during the Two Double Shocks and Its Impact on Foreign Reserve in Iraq
...Show More Authors

The research aims at a statement Internal Debt options during shocks and the impact of this borrowing in the volume of the foreign reserve, using induction and deduction with available data analysis. During the period (2004-2013) did not require the use of borrowing across (financial institutions, discounted transfers, bonds); it was only sufficient by transfer with commercial banks that can finance of temporary budget deficits: rose and decline of volume of foreign reserve according to the changes of oil prices and the volume of purchases and sales of the Central Bank of Iraq. Central Bank of Iraq (CBI) has significantly contributed to Internal Debt through bond and discounted transfers in the secondary market; thus, funding the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Survey theopinions professional and academics on building the strategy of internal audit function and the possibility of keeping abreast of developments
...Show More Authors

The research problem is clearly deficient suffered by the internal audit function in all institutions of Iraq, as a result of the lack of sponsor organizations for this profession and there is no law or local legislation determine its powers and its responsibilities and scope of work As well as the lack of interest of senior management in economic units that function, as it focuses its work on the scope of financial and accounting matters only So required to rebuild this function in line with the current developments as well as the lack of a framework that defines the strategy of this function, and it came the idea of research to find out how to create a regulatory method for re-strategic construction of the internal audit function depen

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Measurements of radon, thoron and their progeny concentrations using twin cup dosimeter for indoor Al-Madaan city – Baghdad – Iraq
...Show More Authors

In this study, the activity concentrations of indoor radon, thoron
and their progeny have been measured in air for 61 different
locations of Al-Maddan city using twin cup dosimeter. Furthermore,
some useful parameters concerning the health hazards have been
estimated; working level month (WLM), annual effective dose (Eff),
and excess lung cancer per million person per year (ELC).The results
show that the values of radon gas levels in the investigated districts
varied from 56.28 to 194.43Bq/m3with an overall average value
132.96Bq/m3, while 0.313 to 1.085 for WLM with an overall average
0.740, respectively. The value of Eff and ELC have been found to
vary from 1.420 to 4.918 mSv/y with an overall average valu

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Nov 12 2014
Journal Name
Wireless Personal Communications
A Multi-objective Disjoint Set Covers for Reliable Lifetime Maximization of Wireless Sensor Networks
...Show More Authors

View Publication
Scopus (19)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Design of Multi-Rate Multi-Zone Wireless Fuzzy Temperature Control System for Greenhouse Application
...Show More Authors

sensor sampling rate (SSR) may be an effective and crucial field in networked control systems.  Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Al–bahith Al–a'alami
Indicators of Mental image among Students of the University of Baghdad about Iraqi Political Parties-(a research based on a master thesis)
...Show More Authors

Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 09 2022
Journal Name
Journal Of Craniofacial Surgery
The Use of Osseodensification for Ridge Expansion and Dental Implant Placement in Narrow Alveolar Ridges: A Prospective Observational Clinical Study
...Show More Authors

The osseodensification (OD) drilling technique was suggested as an alveolar ridge expansion technique, so the aim of this prospective clinical study was to evaluate the amount of bone expansion obtained by the OD drilling technique and its effect on implant stability in patients with narrow alveolar ridges. The width of the alveolar ridge was measured at the crest before and after implant site preparation, whereas the implant stability was measured using Osstell Beacon implant stability quotient (ISQ). The ISQ values were recorded immediately postoperatively and after 16 weeks. Twenty-three patients were included; they received 40 implants. The mean (± standard deviation [SD]) amount of expansion was 1.29 (± 0.41) mm, and the difference b

... Show More
View Publication
Scopus (11)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Drag Forces under Longitudinal Interaction of Two Particle
...Show More Authors

Direct measurements of drag force on two interacting particles  arranged in the longitudinal direction for particle Reynolds numbers varying from J O to 103 are conducted using a micro-force measurement system. The effect of the interparticle distance and Reynolds number on the drag forces  is examined. An empirical equation is obtained to describe the effect of the interparticle distance (l/d) on the dimensionless drag.

View Publication Preview PDF
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref