Preferred Language
Articles
/
eBb9locBVTCNdQwCvFe5
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregation process. In this paper, we have highlighted the gains of the existing schemes for node clustering based data aggregation along with a detailed discussion on their advantages and issues that may degrade the performance. Also, the boundary issues in each type of clustering technique have been analyzed. Simulation results reveal that the efficacy and validity of these clustering-based data aggregation algorithms are limited to specific sensing situations only, while failing to exhibit adaptive behavior in various other environmental conditions.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Sat Jul 01 2017
Journal Name
2017 Computing Conference
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Apr 27 2020
Journal Name
Journal Of Mechanics Of Continua And Mathematical Sciences
A COMPARISON OF TOPOLOGICAL KRIGING AND AREA TO POINT KRIGING FOR IRREGULAR DISTRICT AREA IN IRAQ
...Show More Authors

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Manufacturing and Study the performance of Selective Surfaces that used in flat plate Solar Collectors
...Show More Authors

In this research an experimental study has done for testing the thermal performance of selective surfaces used in solar collectors for substrate of iron, galvanized iron and aluminum which are commercially available. The coating process for the samples has done in two ways, the electroplating and the chemical spray pyrolysis. The results of the thermal performance test of these samples are comparing with the thermal performance of a sample without paint and other paint with black paint without shines commercially available. For the electroplated samples, the performance study has done for different immersion time in plating bath, the
distance between electrical poles, the current density, and area ratio of the sample plated area to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 17 2013
Journal Name
International Journal Of Computer Applications
Applied Minimized Matrix Size Algorithm on the Transformed Images by DCT and DWT used for Image Compression
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 21 2017
Journal Name
Journal Of Entomology And Zoology Studies
Comparison study between a crude bacterial suspension and purified pseudomonal alkaline protease enzyme effect on the rabbit interleukin-2 bacterial keratitis
...Show More Authors

Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
International Journal Of Nonlinear Analysis And Applications
Two Efficient Methods For Solving Non-linear Fourth-Order PDEs
...Show More Authors

This paper studies a novel technique based on the use of two effective methods like modified Laplace- variational method (MLVIM) and a new Variational method (MVIM)to solve PDEs with variable coefficients. The current modification for the (MLVIM) is based on coupling of the Variational method (VIM) and Laplace- method (LT). In our proposal there is no need to calculate Lagrange multiplier. We applied Laplace method to the problem .Furthermore, the nonlinear terms for this problem is solved using homotopy method (HPM). Some examples are taken to compare results between two methods and to verify the reliability of our present methods.

Scopus (10)
Scopus
Publication Date
Fri Jan 01 2016
Journal Name
Results In Physics
An efficient iterative method for solving the Fokker–Planck equation
...Show More Authors

View Publication
Crossref (11)
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Computer Theory And Engineering
MIPOG - An Efficient t-Way Minimization Strategy for Combinatorial Testing
...Show More Authors

View Publication
Crossref (16)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication