Preferred Language
Articles
/
bsj-6086
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the sink. By utilizing Intel Berkeley Research Lab (IBRL) dataset, the efficiency of the proposed method was measured. The experimental findings illustrate the benefits of the proposed method as it reduces the overhead on the sensor node level up to 1.25% in remaining data and reduces the energy consumption up to 93% compared to prefix frequency filtering (PFF) and ATP protocols.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Influence of Optical Fiber Diameters on the Performance of Surface Plasmon Resonance Sensor
...Show More Authors

In this research, a sensor for chemical solutions was designed and formed using optical fiber-based on a surface Plasmon resonance technology. A single-mode optical fiber with three different diameters (25, 45 and 65) µm was used, respectively.  The second layer of the low refractive fiber was replaced by gold, which was electrically deposited at 40 µm thickness. For each of the three types of optical fiber, different saline concentrations (different index of refraction) were used to evaluate the performance of the refractive index sensor (chemical sensor) by measuring its sensitivity and resolutions. The highest values we could get for these two parameters were 240mm/RIU, and 6*10-5 RIU respectively, when the diameter of a

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (8)
Scopus Crossref
Publication Date
Thu Aug 11 2022
Journal Name
Arabian Journal For Science And Engineering
Synthesis and Characterization of Novel Nano Azo Compounds as a New pH Sensor
...Show More Authors

View Publication
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Characterization of (SnO2)1-x(TiO2:CuO)x films as NH3 gas sensor
...Show More Authors

Tin dioxide (SnO2) were mixed with (TiO2 and CuO) with concentration ratio (50, 60, 70, 80 and 90) wt% films deposited on single crystal Si and glass substrates at (523 K) by spray pyrolysis technique from aqueous solutions containing tin (II) dichloride Dihydrate (SnCl2, 2H2O), dehydrate copper chloride (CuCl2.2H2O) and Titanium(III) chloride (TiCl3) with molarities (0.2 M). The results of electrical properties and analysis of gas sensing properties of films are presented in this report. Hall measurement showed that films were n-type converted to p- type as titanium and copper oxide added at (50) % ratio. The D.C conductivity measurements referred that there are two mechanisms responsible about the conductivity, hence it possess two act

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Lecture Notes In Computer Science
The Art of Using Cross-Layer Design in Cognitive Radio Networks
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Nordic Concrete Research
Evaluating Concrete Strength Under Various Curing Conditions Using Artificial Neural Networks
...Show More Authors
Abstract<p>This study examines the impact of different curing methods on the compressive strength of concrete. It investigates techniques such as air curing, periodic water spraying, full water submersion, and polyethylene encasement. Artificial neural network models were employed to evaluate the compressive strength under each curing condition. A model for calculating compressive strength that considers surrounding conditions was created using an artificial neural network. The current study’s figures were generated using this model. The research thoroughly examined the impact of curing environments and concrete mix components on strength properties, taking into account factors such as tempera</p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 19 2022
Journal Name
Mathematical Statistician And Engineering Applications (msea)
Application of TOPSIS method for Multi-Criteria Decision Making for poultry fields By using GIS in Hilla district
...Show More Authors

Statistical methods and statistical decisions making were used to arrange and analyze the primary data to get norms which are used with Geographic Information Systems (GIS) and spatial analysis programs to identify the animals production and poultry units in strategic nutrition channels, also the priorities of food insecurity through the local production and import when there is no capacity for production. The poultry production is one of the most important commodities that satisfy human body protein requirements, also the most important criteria to measure the development and prosperity of nations. The poultry fields of Babylon Governorate are located in Abi Ghareg and Al_Kifil centers according to many criteria or factors such as the popu

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Wed Jun 04 2014
Journal Name
مجلة كلية مدينة العلم الجامعة
تقدير دالة المعولية بالطرائق اللامعلمية في حالة البيانات المراقبة "المتجمعة"
...Show More Authors