Preferred Language
Articles
/
bsj-5948
WOAIP: Wireless Optimization Algorithm for Indoor Placement Based on Binary Particle Swarm Optimization (BPSO)
...Show More Authors

Optimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received signal strength (RSS) measurements simulated using Wireless InSite (WI) software were considered in the test case study by comparing the results collected from WI with the present wireless simulated physical AP deployment of the targeted building - Computer Science Department at University of Baghdad. The performance evaluation of WOAIP shows an increase in terms of AP placement and optimization distinguished in order to increase the wireless coverage ratio to 92.93% compared to 58.5% of present AP coverage (or 24.5% coverage enhancement on average).

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Design and study the effect of inner bore diameter on the magnetic and optical properties of the unipolar lens
...Show More Authors

    Many designs have been suggested for unipolar magnetic lenses based on changing the width of the inner bore and fixing the other geometrical parameters of the lens to improve the performance of unipolar magnetic lenses. The investigation of a study of each design included the calculation of its axial magnetic field the magnetization of the lens in addition to the magnetic flux density using the Finite Element Method (FEM) the Magnetic Electron Lenses Operation (MELOP) program version 1 at three different values of current density (6,4,2 A/mm2). As a result, the clearest values and behaviors were obtained at current density (2 A/mm2). it was found that the best magnetizing properties, the high

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of The College Of Basic Education
Some Thermodynmic Properties of binary Mixtures of Alcohol isomers and Sulfolane at 298.15K
...Show More Authors

The refractive indices, nD densities 𝜌, and viscosities  of binary mixtures of sulfolane + n -butanol + sec- butanol + iso- butanol + tert – butanol + n-propanol and iso- propanol were measured at 298.15K. Form experimental data, excess molar volum VE , excess molar refractivity ∆nD, excess molar viscosity  E and excess molar Gibbs free energy of activation of viscous flow G *E were calculated. From n-propanol – sulfolane and iso- propanol sulfolane mixtures showed negative ∆nD, n-butanol – sulfolane, sec-butanal – sulfolane, iso-butanol – sulfolane and tert- butanol sulfolane , nD was positive over the whole mole fraction rang , while VE ,  E and G *E show a negative deviation. The

... Show More
Preview PDF
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Symmetries of the Interior Design of Fast Food Restaurants
...Show More Authors

The present research deals with the study of the symmetries of the design of interior spaces in fast food restaurants in terms of formality as it is an important element and plays a direct role in the spatial configuration, which is designed in both of its performance, aesthetic and expressive aspects. Since the choice of shapes is a complex subject that has many aspects imposed by functional and aesthetic correlations, the problem of the research is represented by the following question: (To what extent can the symmetries of the interior design be used in the spaces of fast food restaurants?)
The research acquires its importance by contributing to the addition of knowledge to researchers, scholars, companies and the specialized publ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 18 2022
Journal Name
Al-academy
انعكاسات المرايا وتأثيرها في التصميم الداخلي
...Show More Authors
لم يعد اي فضاء سكني يخلو من المرايا التي قد يكون استخدامها وظيفي بحت ولكن وبتطور الحياة اصبحت للمرايا فوائد ومعالجات جماليه ووظيفيه معا ,من هنا جاءت اهمية البحث حيث جاء البحث بثلاثة فصول:الفصل الاول: تم من خلاله تحديد مشكلة البحث والتي تمثلت بالتساؤل(هل هناك تاثير مباشر لانعكاسات المرايا في التصميم الداخلي).كما تم تحديد اهمية البحث والتي تكمن في فتح ابواب معرفيه للدارسين في مجال التصميم الداخلي ل
... Show More
View Publication Preview PDF
Publication Date
Tue Dec 02 2014
Journal Name
مجلة العلوم التربوية والنفسية
الاشتراطات الفاعلة في بنية الفضاء الداخلي
...Show More Authors

ملخص البحث

Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
AN ENHANCED EVOLUTIONARY ALGORITHM WITH LOCAL HEURISTIC APPROACH FOR DETECTING COMMUNITY IN COMPLEX NETWORKS
...Show More Authors

Preview PDF
Scopus (5)
Scopus
Publication Date
Wed Sep 05 2007
Journal Name
Neural Network World
A canonical generic algorithm for likelihood estimator of first order moving average model parameter
...Show More Authors

The increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot

... Show More
Scopus (3)
Scopus