The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobile SN, besides prolong the network lifetime in compare with static SN.
The transfer function model the basic concepts in the time series. This model is used in the case of multivariate time series. As for the design of this model, it depends on the available data in the time series and other information in the series so when the representation of the transfer function model depends on the representation of the data In this research, the transfer function has been estimated using the style nonparametric represented in two method local linear regression and cubic smoothing spline method The method of semi-parametric represented use semiparametric single index model, With four proposals, , That the goal of this research is comparing the capabilities of the above mentioned m
... Show MoreThis study was conducted to determine the Immuno – globulins and complements quantitatively. The result revealed that the concentration of Immunoglobulin M(IgM) was increased significantly in patient group comparing with control group . The concentration of complement protein C4 was increased significantly in patient group comparing with control group.IgG of Candida albicans was detected by using ELISA Technique, the result indicated also that this antibody was found in 628% of the women who infected with Vulvovaginal Candidiasis. The sensitivity and specificity of the test were 63% and 89% respectively.
This research aims to study the methods of reduction of dimensions that overcome the problem curse of dimensionality when traditional methods fail to provide a good estimation of the parameters So this problem must be dealt with directly . Two methods were used to solve the problem of high dimensional data, The first method is the non-classical method Slice inverse regression ( SIR ) method and the proposed weight standard Sir (WSIR) method and principal components (PCA) which is the general method used in reducing dimensions, (SIR ) and (PCA) is based on the work of linear combinations of a subset of the original explanatory variables, which may suffer from the problem of heterogeneity and the problem of linear
... Show MoreAbstract Background: This study is aimed to assess the maxillary incisors’ root position, angulation, and buccal alveolar bone thickness in both genders and different classes of malocclusion using cone‑beam computed tomography (CBCT). Materials and Methods: Two hundred and six CBCT images were gathered and analyzed by three‑dimensional On‑Demand software to measure the variables of 803 maxillary central and lateral incisors. Genders and class difference was determined by unpaired t‑test, one‑way ANOVA, and Chi‑square tests. Results: Buccal root position of the maxillary incisors accounted for in the majority of the cases followed by the middle and palatal positions. The thickness of alveolar bone appears to have nearly the sam
... Show MoreDust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS so
... Show MoreIn light of the increasing interest in Child-rearing in nurseries and kindergartens and the most important experiences gained by the child at this stage that form the basis for the subsequent stages of her/his physical mental and social growth.
The significance of the research concentrates the need to asses the affecting variables on the child growth to create opportunities for her/him to have intact rearing.
The research also aims to classify these variables at each age level and highlight its moral role.
The problem of the research is the lack of clarity of different variables impact of the child growth in different age levels in nurseries and kindergart
... Show MoreIn recent years, the search for economic and environmentally friendly alternatives has become a global necessity to achieve sustainability and preserve raw materials. From this concept, natural bitumen (NB) derived from sulphur springs is now one of the most promising alternative energy resources for many applications, especially in asphalt pavement construction. Its low price and abundance characterise NB since sulphur springs produce thousands of tonnes of NB annually and are used in very limited fields. Two main objectives were adopted for this work. The first objective is to examine the virgin NB properties from five sulphur springs and compare them with petroleum asphalt. The second objective is to enhance NB properties by appl
... Show MoreKE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 4
In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i