Preferred Language
Articles
/
1BZeY4sBVTCNdQwCT8qD
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobile SN, besides prolong the network lifetime in compare with static SN.

Publication Date
Sun Apr 29 2018
Journal Name
Iraqi Journal Of Science
Estimation of The Zenith Path Delay using RTK-DGPS measurements
...Show More Authors

In this paper, the method of estimating the variation of  Zenith Path Delay (ZPD) estimation method will be illustrate and evaluate using Real Time Kinematic Differential Global Positioning System (RTK-DGPS). The GPS provides a relative method to remotely sense atmospheric water vapor in any weather condition. The GPS signal delay in the atmosphere can be expressed as ZPD. In order to evaluate the results, four points had been chosen in the university of Baghdad campus to be rover ones, with a fixed Base point. For each rover position a 155 day of coordinates measurements was collected to overcome the results. Many models and mathematic calculations were used to extract the ZPD using the Matlab environment. The result shows

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Digital Image Watermarking Using Arnold Scrambling and Berkeley Wavelet Transform
...Show More Authors

Embedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.

View Publication Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Projective Properties for Symmetrical Magnetic Lens by Using Exponential Model
...Show More Authors

A computational investigation is carried out in the field of charged particle optics with the aid of the numerical analysis methods. The work is concerned with the design of symmetrical double pole piece magnetic lens.  The axial magnetic flux density distribution is determined by using exponential model, from which the paraxial-ray equation is solved to obtain the trajectory of particles that satisfy the suggested exponential model.  From the knowledge of the first and second derivatives of axial potential distribution, the optical properties such as the focal length and aberration coefficients (radial distortion coefficient and spiral distortion coefficient) are determined.  Finally, the pole piece profiles capable of pr

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 24 2021
Journal Name
Iraqi Journal Of Science
Molecular Detection of Suspected Leishmania Isolates Using Polymerase Chain Reaction
...Show More Authors

Leishmaniasis is a widespread parasitic disease that occurs as a result of infection with a unicellular parasite belonging to the genus Leishmania. Diagnosis by conventional methods is inaccurate and is not sensitive to confirm the genus infection. Here, we have investigated a methods for Leishmania genus diagnosis, which includes the technique of polymerase chain reaction to detect the presence of the parasite at in vitro for promastigote cultures using three genus-specific primer pairs to amplify HSP70, ITS, and ITS2. The results showed single band of ~1422, ~1020, and ~550 respectively. This study has proved the ability of these primer pairs to detect Leishmania infection and recommend them to be used for detection of leishmaniasis in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Craniofacial Surgery
Radiographic Assessment of Nasopalatine Canal Using Cone Beam Computed Tomography
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Quadratic Assignment Problem by Using Meta-heuristic Search Method
...Show More Authors

While analytical solutions to Quadratic Assignment Problems (QAP) have indeed been since a long time, the expanding use of Evolutionary Algorithms (EAs) for similar issues gives a framework for dealing with QAP with an extraordinarily broad scope. The study's key contribution is that it normalizes all of the criteria into a single scale, regardless of their measurement systems or the requirements of minimum or maximum, relieving the researchers of the exhaustively quantifying the quality criteria. A tabu search algorithm for quadratic assignment problems (TSQAP) is proposed, which combines the limitations of tabu search with a discrete assignment problem. The effectiveness of the proposed technique has been compared to well-established a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 22 2020
Journal Name
Iraqi Journal Of Laser
Stress Urinary Incontinence Treatment Using Vaginal Fractional CO2 Laser (10600nm)
...Show More Authors

Stress urinary incontinence (SUI) is involuntary urine leakage during activities that increase abdominal pressure such as coughing, sneezing and lifting of heavy weights. This is a very common disorder among women with history of multiple vaginal deliveries with an obstructed labor. SUI is considered one of the most distressing problems, especially for younger women, with severe quality of life implications, it caused by the loss of urethral support, usually as a consequence of the supporting structural muscles in the pelvis.

Objective: To prove and demonstrate the effect of a fractional CO2 micro-ablative laser (10600nm) in intra vaginal therapy for treating SUI and achieve a clinical improvement of t

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
Hiding and Encryption of Secret Image Using Secret Sharing Scheme
...Show More Authors

With the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of im

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback

... Show More
View Publication Preview PDF