The issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting regional monitoring into point monitoring utilizing the discretization method in WSN. In the experiments, the ICS-PSO-OBL with the standard CS and three CS variants (MACS, ICS-2, and ICS) are utilized to execute the simulation experiment under different numbers of nodes (20 and 30, respectively). The experimental results reveal that the optimized coverage of ICS-PSO-OBL is 18.36%, 7.894%, 15%, and 9.02% higher than that of standard CS, MACS, ICS-2, and ICS when the number of nodes is 20. Moreover, it is 16.94%, 9.61%, 12.27%, and 7.75% higher when the quantity of nodes is 30, the convergence speed of ICS-PSO-OBL, and the distribution of nodes is superior to others.
The current study aims to cover the health topics in the Iraqi journalism , to know the concern 's level of the Iraqi journalism when covering the health subjects and to know the size of its performance under the diversity of visual and audio medias. The researcher has discussed his research by wording it with a set of inquiries that should be answered via the research and study. He could have determined that by the following:
What is the concern's level of Iraqi journalism over the health subjects? What are the forms and press arts that are functionalized by the Iraqi journalism as to get the health message to the republics? What is t
... Show MoreWith the advancement of modern radiotherapy technology, radiation dose and dose distribution have significantly improved. as part of Natural development, interest has recently been renewed by treatment, especially in the use of heavy charged particles, because these radiation types serve theoretical advantages in all biological and physical aspects. The interactions of alpha particle with matter were studied and the stopping powers of alpha particle with Bone Tissue were calculated by using Zeigler’s formula and SRIM software, also the Range for this particle were calculated by using Mat lab language for (0.01-1000) MeV alpha energy.
In this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes
... Show MoreThe reconciliation of tax reconciliation is one of the legal methods used by the financial authority in Iraq, which is done with the taxpayer
The research dealt with the weakness of tax revenues for many reasons, including tax evasion, which led to the search for ways to reduce evasion to increase the tax revenue, and settlement reconciliation one of these means .
The research proceeded from the premise that the use of a more broadly settled settlement would govern the tax evasion of taxpayers.
The researchers used a series of studies and previous research, books and other sources related to the subject of research, and this was done through the theoretical framework, and the practical aspect that included the fin
... Show MoreThis research reports an error analysis of close-range measurements from a Stonex X300 laser scanner in order to address range uncertainty behavior based on indoor experiments under fixed environmental conditions. The analysis includes procedures for estimating the precision and accuracy of the observational errors estimated from the Stonex X300 observations and conducted at intervals of 5 m within a range of 5 to 30 m. The laser 3D point cloud data of the individual scans is analyzed following a roughness analysis prior to the implementation of a Levenberg–Marquardt iterative closest points (LM-ICP) registration. This leads to identifying the level of roughness that was encountered due to the range-finder’s limitations in close
... Show MoreThe research aims to: Preparing rehabilitative exercises with accompanying tools to rehabilitate those with shoulder dislocation. Knowing the effect of rehabilitative exercises and accompanying aids in improving the muscular strength and motor range of those with dislocations in the shoulder joint. The two researchers used the experimental design with the same experimental group with the pre and post tests, so the researcher chose a sample appropriate to the nature of his research problem, its goals and its hypotheses, as a sample of the injured was chosen to remove the shoulder joint, who completed the treatment, who were not practicing sports, and those who went to the Physiotherapy Center at Al-Was
... Show MoreThis Study Sought to Determine The Relationship and Impact Between The Tax Core Capabilities and Tax Settlement The Study Took Place in The Tax Administration, and Based The Problem Was to Two Hypotheses As Solutions Initial Mocked Content to Explain The Relationship Between The Phenomena, and to Test The Validity of Assumptions And Due To The Fact That The General Authority for Taxes is The Body for The Advancement of The Collection Tax In Iraq Random Sample Was Selected to Represent The Population of The Study, Since The Sample Included 22 Individuals Representing 70% of The Total Community to Study, Represented by The Director General, Agents and Directors of Departments and Branch Managers Managers Working in The General Authority fo
... Show MoreThe specifications of lubricating oil are fundamentally the final product of materials that have been added for producing the desired properties. In this research, spherical nanoparticles copper oxide (CuO) and titanium oxides (TiO2) are added to SAE 15W40 engine oil to study the thermal conductivity, stability, viscosity of nano-lubricants, which are prepared at different concentrations of 0.1%, 0.2%, 0.5%, and 1% by weight, and also their pour point, and flash point as five quality parameters. The obtained results show that CuO nanoparticles in all cases, give the best functionality and effect on engine oil with respect to TiO2. With 0.1 wt. % concentration, the thermal conductivity of CuO/oil and TiO2/
... Show MoreThis research aims to numerous risks to the portfolio of the insurance company that arise from practicing the activity in general, and the risks arising from insurance contracts in particular, and what is the role of the company in the disclosure to help users (such as owners) to understand and concentration of risks in the financial reporting and identifying movable risks size to reinsurers that may affect the solvency of the portfolio and makes them at a given moment required to fulfill the obligations towards policyholders outweigh the financial capacity, which leads to stumble or bankruptcy.
So I sought this research is to identify the extent of the obligation to disclose the accounting for this risk and the extent of their i
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More