Preferred Language
Articles
/
bsj-6644
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-configuring mesh network in IoT sensor devices for better independent data collection quality. The research conducted in this paper is to build a mesh network using NodeMCU ESP 8266 and NodeMCU ESP 32 with two types of sensor, DHT 11 and DHT 22. Hence, the work here has evaluated on the delay performance metric in Line-of-Sight (LoS) and Non-Line-of-Sight (nLos) situation based on different network connectivity. The results give shorter delay time in LoS condition for all connected nodes as well as when any node fail to function in the mesh network compared to nLoS condition. The paper demonstrates that the IoT sensor devices composing the mesh network is a must to leverage the link communication performance for data collection in order to be used in IoT-based application such as fertigation system. It will certainly make a difference in the industry once being deployed on large scale in the IoT world and make the IoT more accessible to a wider audience.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Digital-Based Optimal AVR Design of Synchronous Generator Exciter Using LQR Technique
...Show More Authors

In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q,  this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Tagmemic Analysis of English and Arabic Praise Poetry: A Contrastive Study
...Show More Authors

 This research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:

  1. Is it possible to examine praise poetry as a tagmeme?
  2. Is this analysis of great help in teaching English and Arabic to students in the College of Education?

           The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.

   &nbs

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 04 2015
Journal Name
Journal Of Educational And Psychological Researches
The concept of physical, psychological and social self with the kindergartens
...Show More Authors

The concept of self is considered one of the important dimensions in the human personality, because feeling of self is an important characteristic in this phase from the psychological point of view.

The first source which forms the concept of self is the physical image, where the built and appearance of the body is considered among the vital matters which determine the person's image of himself/herself. 

The current research aims to:

1) Identify the level of physical self concept at the kindergarten children.

2) Identify the level of psychological self concept at the kindergarten children.

3) Iden

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation the efficiency of nursing performance depended on standards of( W.H.O )Practical research in medical city office hospitals
...Show More Authors

      This research a mining at evaluation the efficiency of the nursing performance depended on standards of W.H.O. via application standards of W.H.O on the nursing personnel in medical city office,  in light of it, it has design  world evaluation list, and a sample was chosen  from the nursing personnel in  given researched the organization whom they are evaluated according to the standards of W.H.O for the nursing performance included of ten standards, divided in to 45 question , besides the evaluation list, the researcher get assistance of some tools of collection information via  actual checking and personal interviews, a number of statistical means were used to manipulate t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment Knowledge and Attitudes of Baghdad University Students’ toward Human immunodeficiency virus / acquired immunodeficiency syndrome
...Show More Authors

Objective(s): To assess Baghdad University students’ knowledge and attitudes toward HIV/AIDS, and to find out
the relationship of Baghdad University students’ knowledge and attitudes with certain variables (gender,
socioeconomic status, field of study).
Methodology: A descriptive analytic study was used to assess the knowledge and attitudes of Baghdad University
Students’ toward HIV/AIDS. The study was conducted (November 1st 2012 to July 15th 2013). A non-probability
(purposive sample) of 400 students (males-138 and females-262) were selected from four colleges and they were
in the fourth class, a probability (stratified random) method was used to select four colleges at University of
Baghdad as a study settin

... Show More
View Publication Preview PDF