Preferred Language
Articles
/
Koa2pIYBIXToZYALd5zD
Proposed emerged and enhanced routing protocols for wireless networks
...Show More Authors

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as DS-ZRP routing protocol. The third proposed routing protocol is designed based on using the advantaged of multipoint relays in OSLR protocol with the advantages of route cashing in DSR protocol, and we named it as OLS-DSR routing protocol. Then, some experimental tests are doing by demonstration case studies and the experimental results proved that our proposed routing protocols outperformed than current wireless routing protocols in terms of important network performance metrics such as periodical broadcast, network control overhead, bandwidth overhead, energy consumed and latency.

Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
A Neural Networks based Predictive Voltage-Tracking Controller Design for Proton Exchange Membrane Fuel Cell Model
...Show More Authors

In this work, a new development of predictive voltage-tracking control algorithm for Proton Exchange Membrane Fuel Cell (PEMFCs) model, using a neural network technique based on-line auto-tuning intelligent algorithm was proposed. The aim of proposed robust feedback nonlinear neural predictive voltage controller is to find precisely and quickly the optimal hydrogen partial pressure action to control the stack terminal voltage of the (PEMFC) model for N-step ahead prediction. The Chaotic Particle Swarm Optimization (CPSO) implemented as a stable and robust on-line auto-tune algorithm to find the optimal weights for the proposed predictive neural network controller to improve system performance in terms of fast-tracking de

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Iraqi Journal Of Science
AHeuristic Strategy for Improving the Performance of Evolutionary Based Complex Detection in Protein-Protein Interaction Networks
...Show More Authors

One of the most interested problems that recently attracts many research investigations in Protein-protein interactions (PPI) networks is complex detection problem. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem wherein, recently, the field of Evolutionary Algorithms (EAs) reveals positive results. The contribution of this work is to introduce a heuristic operator, called protein-complex attraction and repulsion, which is especially tailored for the complex detection problem and to enable the EA to improve its detection ability. The proposed heuristic operator is designed to fine-grain the structure of a complex by dividing it into two more complexes, each being distinguished with a core pr

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Accounting measurement of strategic storage in light of government support and its implications for presentation and disclosure / proposed model: an analytical study at the General Company for Grain Trade
...Show More Authors

يؤدي عرض معلومات مضللة او محرفة ضمن القوائم المالية والتي تعد أهم مصادر المعلومات الموثوقة التي يُعول عليها لاتخاذ القرارات السليمة الى عدم قدرتها على عكس نتيجة النشاط والمركز المالي لها او اعمال الوحدة الاقتصادية لتلك الفترات الزمنية بصورة صادقة وعادلة نتيجة لنوعية المعلومات المفصح عنها في القوائم المالية لذلك زاد الاهتمام بتطوير الممارسات المحاسبية لتتضمن افصاحات كافية بغرض اعطائهم صورة صادقة وعادلة

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 09 2025
Journal Name
Journal Of Physical Education
Special Exercises Using A Proposed Training Apprentice And Its Effect On Some Biomechanical Indicators and Achieving 110m Hurdles For players Under 20 years old
...Show More Authors

View Publication
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhanced Support Vector Machine Methods Using Stochastic Gradient Descent and Its Application to Heart Disease Dataset
...Show More Authors

Support Vector Machines (SVMs) are supervised learning models used to examine data sets in order to classify or predict dependent variables. SVM is typically used for classification by determining the best hyperplane between two classes. However, working with huge datasets can lead to a number of problems, including time-consuming and inefficient solutions. This research updates the SVM by employing a stochastic gradient descent method. The new approach, the extended stochastic gradient descent SVM (ESGD-SVM), was tested on two simulation datasets. The proposed method was compared with other classification approaches such as logistic regression, naive model, K Nearest Neighbors and Random Forest. The results show that the ESGD-SVM has a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Planner And Development
Alternative development in the proposed model of the Strategy for Empowerment and Spatial Sustainable Development/ Baghdad Governorate Council as a case study
...Show More Authors

This research mainly aims to analyze local development strategy in Baghdad Governance, build the Strategic Model based on the study area's spatial interaction, and achieve the Trinity of Excellence based on the global model of excellence.

           This research applied SWOT strategic analysis for the strengths and weaknesses of the internal environment and opportunities and threats of the external environment for the provincial council. In conclusion, the research specifies appropriate alternatives and choosing the best in line with the reality of the Baghdad Provincial Council. Also, the strategic goals in the national plan and the spatial interaction of the development goals,

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Materials Science In Semiconductor Processing
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

View Publication
Scopus (35)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Speech Analyses Method Using the Multiwavelet Transform
...Show More Authors

  Speech is the first invented way of communication that human used age before the invention of writing. In this paper, proposed method for speech analyses to extract features by using multiwavelet Transform (Repeated Row Preprocessing).The proposed system depends on the Euclidian differences of the coefficients of the multiwavelet Transform to determine the beast features of speech recognition. Each sample value in the reference file is computed by taking the average value of four samples for the same data (four speakers for the same phoneme). The result of the input data to every frame value in the reference file using the Euclidian distance to determine the frame with the minimum distance is said to be the "Best Match". Simulatio

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhanced conversion of Glycerol to Glycerol carbonate on modified Bio-Char from reed plant: Enhanced conversion of Glycerol to Glycerol carbonate on modified Bio-Char from reed plant
...Show More Authors

The surplus glycerol produced from biodiesel production process as a by-product with high quantity can be considered as a good source to prepare glycerol carbonate (GC) whereas with each 1000 kg from biodiesel obtains 100 kg from glycerol. Glycerol converted to glycerol carbonate over bio-char as a catalyst prepared by slow pyrolysis process under various temperatures from 400 ᴼC to 800 ᴼC. The char prepared at 700 ᴼC considered as a best one between the others which was manufactured to activate the transesterification reaction. GC have large scale of uses such as liquid membrane in gas separation, surfactants ,detergents , blowing agent , in plastics industry, in  Pharmaceutical industry and electrolytes in lithium batteries.

... Show More
View Publication Preview PDF
Crossref