Preferred Language
Articles
/
joe-436
On Gradient Descent Localization in 3-D Wireless Sensor Networks
...Show More Authors

Localization is an essential demand in wireless sensor networks (WSNs). It relies on several types of measurements. This paper focuses on positioning in 3-D space using time-of-arrival- (TOA-) based distance measurements between the target node and a number of anchor nodes. Central localization is assumed and either RF, acoustic or UWB signals are used for distance measurements. This problem is treated by using iterative gradient descent (GD), and an iterative GD-based algorithm for localization of moving sensors in a WSN has been proposed. To localize a node in 3-D space, at least four anchors are needed. In this work, however, five anchors are used to get better accuracy. In GD localization of a moving sensor, the algorithm can get trapped in a local minimum causing the track to deviate from the true path, thereby impairing real-time localization. The proposed algorithm is based on systematically replacing anchor nodes to avoid local minima positions. The idea is to form all possible combinations of five-anchor sets from a set of available anchor nodes (larger than five), and to segment the true path. Iterating through each segment, the sets of anchors that could draw the track to a local minimum are discarded and replaced with possible others to maintain the right track.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
The aesthetic formation of metaphor Textual reading in the office of Majd al-Din al-Nashabi (D. 656 A.H)
...Show More Authors

وظَّفَ الشاعرُ مجد الدين النُّشَّابي الصورة الاستعارية التي شكلت سمةً جمالية بارزة من سماتِ التشكيل الشعري عنده, وأحد المكونات الأساسية في بنية قصائده الشعرية وهي جوهر الإبداع ومحط التذوق عند المتلقي, إذ يشكل الشاعر صوره الاستعارية المتنوعة متولدة من خياله وعواطفه ومتوافقة مع الموضوع لتصبح الصورة  الاستعارية ركنًّا من أركان التشكيل الفني الشعري عند الشاعر .

والتصوير الاستعاري له القدرة بالتشكيل ا

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Knowledge, attitude and practice of Iraqi mothers towards Vitamin D supplementation to their infants in Baghdad Al -Rusafa 2016
...Show More Authors

Background: Routine supplementation of vitamin D to infants is justifiable since vitamin D deficiency, and its consequences are highly prevalent not only in developing countries but worldwide. Maintaining a normal level of vitamin D is crucial in order to have a normal skeletal, as well as, extra-skeletal health. Knowledge of mothers regarding importance of vitamin D supplementation affect the health of their babies in a positive manner if accompanied by appropriate practice.

Objective: To determine the level of knowledge, attitude and practice of Iraqi mothers of under or equal 12 months old infants in Baghdad, AL-Rusafa, regarding vitamin D supplementation for their infants.

Typ

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Indian Journal Of Public Health Research & Development
A Comparative Study of Vitamin D Levels and Some Biochemical Parameters between Healthy and Breast Cancer in Iraqi Females.
...Show More Authors

Breast cancer is one of the most widespread cancers,depending on World Health Organization, cancer calculated for approximately 7.6 million incidences in 2008, whoever expected elevation in incidence is about 13.1 million in 2030. So that the current research investigates vitamin D role in the occurrence of this disease and explains if vitamin D has a positive effect on the incidence of disease, as well as measuring parathyroid hormone and estrogen levels. Three groups were included in this analysis: control healthy women, benign and malignant breast tumor women. All cases that were selected at the beginning of the disease diagnosis. According to statistical values vitamin D showed highly significant (P<0.001) decrease in benign (3.74±2.33

... Show More
Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
The Jews of the East in the journey of Benjamin and the Andalusian Alttali (d. 586 AH): (دراسة تحليلية)
...Show More Authors

Because of the diverse circumstances in Andalusia, the Jews lost much of the atmosphere of freedom and coexistence, which they enjoyed under Islamic rule there, to leave more Jews in the sixth century AH, under Spanish rule abolishing the existence of the other. And to impose his negativity with unjust domination. What motivated the people of Judaism; to turn their faces on the Islamic East; according to the coexistence climates that glorified various religions. It has emerged in this regard Benjamin Title (d. 685 e), who made a long journey to the east, recorded in the texts of the traveler, what will be shown research, God willing.

View Publication Preview PDF
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks
...Show More Authors

Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (7)
Scopus Clarivate Crossref