Preferred Language
Articles
/
gxZXl4cBVTCNdQwCRlcY
ESAM: Endocrine inspired Sensor Activation Mechanism for multi-target tracking in WSNs
...Show More Authors

Target tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocrine system of the human body. Sensor nodes in our network are secreting different hormones according to certain rules. The hormone level enables the nodes to regulate an efficient sleep and wake up cycle of nodes to reduce the energy consumption. It is evident from the simulation results that the proposed ESAM in autonomous sensor network exhibits a stable performance without the need of commands from a central controller. Moreover, the proposed ESAM generates more efficient and persistent results as compared to other algorithms for tracking an invading object.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More
Publication Date
Sat Jan 12 2013
Journal Name
International Journal Of Advanced Research In Engineering And Technology (ijaret)
FABRICATION OF AGAL/SI SOLAR CELL
...Show More Authors

The structural, optical and photoelectrical properties of fabricated diffusion heterojunction (HJ) solar cell, from n-type c-Si wafer of [400] direction with Boron, has been studied. AgAl alloys was used because of its properties that affect as a good connection materials. TiO2 has been used as a reflecting layer to increase the absorption radiation. The HJ has direct allowed energy gap equal to 3.1 eV. The c-Si/B HJ solar cell yielded has an active area conversion efficiency of 16.4% with an open circuit voltage of (Voc) 0.592V, short circuit current (Isc) of 2.042mA, fill factor (F.F) of 0.682 and % =10.54.

Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
International Medical Journal
The Effect of Adding Poloxamer Surfactant on Cleaning Efficiency of NaOCl and NaOH (SEM Study)
...Show More Authors

Objectives: The purpose of this in vitro study was to compare the effect of adding a poloxamer surfactant to the irrigant solutions on its cleaning efficiency. Design: In this study the roots of extracted permanent premolar teeth were used and evaluated by using Scanning Electronic Microscopy (SEM). Materials and Method: 72 human single tooth of permanent premolar (8 for each group) were used in this in vitro study. Roots after sectioning at cervical area to get 15 mm were embedded in a plastic container filled with impression silicon, then instrumented with ProTaper rotary instruments till size F4. Each group (8 root) were irrigated with one of the nine solutions used in study: three concentrations of NaOH [5% (A1), 2.5%(A2), 0.5%(A3)], th

... Show More
Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Efficiency Prediction and Performance Characterization of Photovoltaic Solar Panel at Baghdad Climate Conditions
...Show More Authors

The performance of a solar cell under sun radiation is necessary to describe the electrical parameters of the cell. The Prova 200 solar panel analyzer is used for the professional testing of four solar cells at Baghdad climate conditions. Voltage -current characteristics of different area solar cells operated under solar irradiation for testing their quality and determining the optimal operational parameters for maximum electrical output were obtained. A correlation is developed between solar cell efficiency h and the corresponding solar cell parameters; solar irradiance G, maximum power Pmax, and production date P. The average absolute error of the proposed correlation is 5.5% for 40 data points. The results also show th

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the cost of consulting services under the traditional cost approach and the performance-based costing technique and its impact on achieving profits : Applied research in the advisory office of Al-Khwarizmi College of Engineering - University of Baghdad
...Show More Authors

Abstract:

                    This research aims to apply the Performance Focused Activity Based Costing System in the consultant office of Al-Khwarizmi College of Engineering at the University of Technology for the purpose of measuring the cost of consulting services provided by these offices in order to reduce costs and their reflection in achieving profits. For the purpose of calculating costs accurately, and to test the hypothesis of the research, the research was applied in the office of the consultant of the College of Engineering Al-Khwarizm - University of Baghdad through the financial statement

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
The Surgical outcomes of fundus-first technique in lowering the rate of bile duct injuries and bleeding during open cholecystectomy that facing intraoperative difficulties: A single-center prospective study: The surgical outcomes of open fundus-first cholecystectomy technique.
...Show More Authors

Background: The problem of difficult gallbladder is not clearly defined and associated with real missing of therapeutic approaches that decreased morbidity. Moreover, the difficult gallbladder was reported as a contributing risk factor for biliary injury due to raised difficulty in surgical dissection within Calot’s triangle. The aim of this study is to determine the surgical outcomes of the open fundus-first cholecystectomy in lowering the rate of lethal intraoperative risks.

Subjects and Methods: Our prospective study conducted during the period of January 2019 to December 2022 at Ibn Sina specialized hospital, Khartoum, Sudan, for two hundred and fifty-three patients underw

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Six Thinking Hats Strategy on the Development of Essay Writing Skills and Creativity in It among Persian-Speaking Students Who are Studying Arabic Language and Literature At Shiraz University: Literature and Humanities, Shiraz University
...Show More Authors

The study aims to investigate the effect of the Six Thinking Hats Strategy on the achievement of essay writing skills among third-year students in Arabic Language and Literature who are Persian speakers enrolled in the course of Essay Writing (III) at Shiraz University for the academic year 2019-2020. The sample of the study consisted of (15) male and female students who were taught according to the pre-posttest, using the quasi-experimental approach. After applying the statistical analysis on the scores of the post-test, the results showed that there are statistically significant differences in the average of students' achievement in the skills of essay writing in terms of using the Six Thinking Hats Strategy. The results also proved th

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.

Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref