Preferred Language
Articles
/
joe-194
Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network
...Show More Authors

Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one protocol to another depending on the applications used in the network. The network design is done using the program (Op-Net V14.5 modular) with core i7 computer for multiple nodes deployed randomly in several area (100 * 100, 200 * 200, 400 * 400, 800 * 800, 1000 * 1000)m2 accomplished by changing the number of nodes in the network (10, 20, 40 and 80). There are three programs designed using (MATLAB 2012A programming language). The first one evaluates the (QoS) using the organizational structure of the mysterious system (HFS), which relied on the standard applications that should be provided by the protocols to make the applications accepted by the nodes requirements. After the evaluation the QoS for all cases, we design Neural Network to assist in estimation of the best protocol for any network through QoS for all protocols (AODV, DSR, OLSR and TORA). Neural network has four entrances (area, number of nodes, real time application ratio and non-real time application ratio). The results show that the QoS estimated is (0.5401) of (OLSR) which has been improved to (0.6421) by reducing to mobility speed and making some nodes fixed and using more than one protocol in  the network to provide the best QoS .

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
Using typographic patterns in commercial advertising design: عصام إبراهيم محمد الكبيسي
...Show More Authors

Typographic patterns are one of the design elements in commercial advertising for their ability to deliver the message and information to the recipient smoothly and quickly, and it is indicated that there are many different techniques that can use typographic patterns in commercial advertisements, including spacing, spaces between letters, letter height, length, weight, and contrast and this Usage must be studied according to the type of font and how it can be used in advertising campaigns.
Based on the above, the research came to study (employing typographic patterns in commercial advertising design) in which the researcher identified his question for the purpose of reaching a solution to his research problem which is (Is it possible

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Automatic human ear detection approach using modified adaptive search window technique
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 International Conference On Electrical Engineering And Computer Science (icecos)
An Evolutionary Algorithm for Community Detection Using an Improved Mutation Operator
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 12 2020
Journal Name
Al-khwarizmi Engineering Journal
Improving Reverse Engineering Processes by using Articulated Arm Coordinate Measuring Machine
...Show More Authors

The invention relates to a coordinate measuring machine (CMM) for determining a measuring position of a probe. The AACMM isdepends on the robotkinematics (forward and reverse) in their measurementprinciple, i.e., using the AACMM links and joint angles todetermine the exact workspace or part coordinates. Hence, themeasurements are obtained using an AACMM will be extremely accurate and precise since that ismerely dependent on rigid structural parameters and the only source of measurement error is due to human operators. In this paper, a new AACMM design was proposed. The new AACMM design addresses common issues such as solving the complex kinematics, overcoming the workspace limitation, avoiding singularity, and eliminating the effects of

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
Sand bioconsolidation/biosolidification by microbially induced carbonate precipitation using ureolytic bacteria
...Show More Authors

Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Nasaq Journal
How Using Punctuation Dominates the Way Written Jokes Can Be Comprehended
...Show More Authors

A joke is something that is said, written, or done to cause amusement or laughter. It could be a short piece or a long narrative joke, but either way it ends in a punchline, where the joke contains a second conflicting meaning. Sometimes when we read a joke, we understand it directly and fully, but this is not always the case. When a writer writes a joke, he intends to manipulate the reader in a way that the reader doesn’t get the joke at once. He does that by using pun on words or any other word play. We, as listeners to the joke, try to get the message depending mostly on the tone of the voice, in addition to other factors concerning vocabulary and grammar. But as readers of the joke, we need more other factors in order to get

... Show More
Publication Date
Sun Nov 19 2023
Journal Name
Aip Conference Proceedings
Designing a database for a three dimensional model using geomatics techniques
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Eyewitnesses’ Visual Recollection in Suspect Identification by using Facial Appearance Model
...Show More Authors

Facial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Coagulation - Flotation Process for Removing Oil from wastewater using Sawdust+ Bentonite
...Show More Authors

In many industries especially oil companies in Iraq consumed large quantities of water which will produce oil-contaminated water which can cause major pollution in agricultural lands and rivers. The aim of the present work is to enhance the efficiency of dispersed air flotation technique by using highly effective and cost-efficient coagulant to treating gas oil emulsion. The experimental work was carried out using bubble column made of Perspex glass (5cm I.D, 120cm height). A liquid was at depth of 60cm. Different dosage of sawdust +bentonite at ratio 2:1 (0.5+ 0.25; 1+ 0.5 and 2+1) gm and alum at concentration (10,20and30mg/l) at different pH ( 4 and 7) were used to determine optimum dosages of coagulant. Jar test exper

... Show More
View Publication Preview PDF