Preferred Language
Articles
/
joe-1998
A Comparative Study of Single-Constraint Routing in Wireless Mesh Networks Using Different Dynamic Programming Algorithms
...Show More Authors

Finding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorithms are proposed in this work with a discussion on the difference between them. These algorithms find the shortest route through finding the optimal rate between two nodes in the wireless networks but with bounded end-to-end delay. The Dijkstra-based algorithm is especially favorable in terms of processing time. We also present a comparison between our proposed single-constraint Dijkstra-based routing algorithm and the mesh routing algorithm (MRA) existing in the literature to clarify the merits of the former.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
B-splines Algorithms for Solving Fredholm Linear Integro-Differential Equations
...Show More Authors

Algorithms using the second order of B -splines [B (x)] and the third order of B -splines [B,3(x)] are derived to solve 1' , 2nd and 3rd linear Fredholm integro-differential equations (F1DEs). These new procedures have all the useful properties of B -spline function and can be used comparatively greater computational ease and efficiency.The results of these algorithms are compared with the cubic spline function.Two numerical examples are given for conciliated the results of this method.

View Publication Preview PDF
Publication Date
Sun Mar 03 2019
Journal Name
Iraqi Journal Of Physics
Experimental observation of the far field diffraction patterns of functionalization single and multi-walled carbon nanotubes using nonlinear diffraction technique
...Show More Authors

Nonlinear diffraction pattern can be induced by focusing CW
laser into a thin quartzes cuvette containing nanofluid. The number
of revealed pattern rings indicates to the nonlinear behavior of fluid.
Here, the nonlinear refractive index of each of functionalized single
wall carbon nanotube (F-SWCNTs) suspention and multi wall carbon
nanotube (F-MWCNTs) suspention have been investigated
experimentally .Each of CNTs suspention was at volume fraction of
13×10−5 and 6×10−5. Moreover the laser source at wavelength of
473 nm was used. The results show that SWCNTs suspention
possesses higher nonlinearty than other at the same volume fraction

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
The Journal Of Contemporary Dental Practice
Assessment of Ions released from Three Types of Orthodontic Brackets immersed in Different Mouthwashes: An in vitro Study
...Show More Authors

View Publication
Scopus (10)
Crossref (10)
Scopus Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Reasons for Lying in Kindergarten Children from the Kindergarten Teachers’ Point of View: A Comparative Study between Males and Females: سجلاء فائق هاشم , كلثوم عبد عون ردام
...Show More Authors

Lying is considered a dangerous tendency among children if it has become a habit. It results in many social problems, such as child’s loss of confidence, lack of others’ respect to him, and his lack of respect to the desired values ​​of the society, such as honesty and trust. Consequently, he will be led to a deviation when he becomes old; especially if the child’s socially unaccepted behavior has not been directed. The research, thus, aims to examine the causes of lying in the most important stage of children’s life; that is, between (4-6) years. Such an aim helps to know about the individual reasons of lying among males and females from teachers’ perspectives. To meet the objective of the study, a number of (128) children

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
A comparative study of the pivotal characters in the novel "Al-Shahz" and the script "Hamoon": بررسی تطبیقی شخصیت¬های محوری در رمان «الشحّاذ» و فیلم‌نامۀ «هامون»
...Show More Authors

The novel is the revelation of the attitudes of every age. And the writers do not know the winner of their stroke to express these events، The research has been working on a descriptive-analytical approach based on the American Comparative School، Al-Shahez's novel explores the work of the nobly and the film by Hamoun by Dariush Mehrjui By relying on the main characters of these two narratives, they depict a picture of Egypt and Iran From the symbolic lines of these works. In fact, the authors of this research have tried to initiate the introduction and analysis of these two works In fact, the authors of this research have tried to initiate the introduction and analysis of these two works.

 The results of the research show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 31 2020
Journal Name
Bmc Oral Health
The success of using 2% lidocaine in pain removal during extraction of mandibular premolars: a prospective clinical study
...Show More Authors
Abstract<sec><title>Background

The purpose of this study was to evaluate the anesthetic effectiveness of a buccal infiltration technique combined with local massage (using 2% lidocaine) in the extraction of mandibular premolars to be utilized as an alternative to the conventional inferior alveolar nerve block.

Methods

Patients eligible included any subject with a clinical indication for tooth extraction of the mandibular 1st or 2nd premolars. All patients were anesthetized buccally by local infiltration technique followed by an external pressure applied for 1 min directly over the injection area. In each case, another local

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Fri Jul 24 2020
Journal Name
Al-kindy College Medical Journal
A review study of targeting of AAK1 and JAK1/2 using baricitinib in COVID-19 infected human cells
...Show More Authors

     The outbreak of a current public health coronavirus 2019 disease is a causative agent of a serious acute respiratory syndrome and even death. COVID-19 has exposed to multi-suggested pharmaceutical agents to control this global disease. Baricitinib, a well-known antirheumatic agent, was one of them. This article reviews the likely pros and cons of baricitinib in attenuation of COVID-19 based on the mechanism of drug action as well as its pharmacokinetics. The inhibitory effect of baricitinib on receptor mediated endocytosis promoter, AKK1, and on JAK-STAT signaling pathway is benefacial in inhibition of both viral assembling and inflammation. Also, its pharmacokinetic has encouraged the physicians toward the drug

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Hydrology
Boosted artificial intelligence model using improved alpha-guided grey wolf optimizer for groundwater level prediction: Comparative study and insight for federated learning technology
...Show More Authors

View Publication
Scopus (46)
Crossref (53)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Results In Engineering
Predictive model for stress at ultimate in internally unbonded steel tendons based on genetic expression programming
...Show More Authors

View Publication
Crossref (15)
Crossref