The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreIn data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreAerial Robot Arms (ARAs) enable aerial drones to interact and influence objects in various environments. Traditional ARA controllers need the availability of a high-precision model to avoid high control chattering. Furthermore, in practical applications of aerial object manipulation, the payloads that ARAs can handle vary, depending on the nature of the task. The high uncertainties due to modeling errors and an unknown payload are inversely proportional to the stability of ARAs. To address the issue of stability, a new adaptive robust controller, based on the Radial Basis Function (RBF) neural network, is proposed. A three-tier approach is also followed. Firstly, a detailed new model for the ARA is derived using the Lagrange–d’A
... Show MoreStrategic decision making is considered one of the important processes for senior management in contemporary business organizations and service organizations due to the properties of the service such as intangibility, concomitance and mortality. Decision-making has three approaches according to the opinions of most of the writers and researchers in the administrative area: an analytical approach, intuitive approach and behavioral approach. This research is trying to discover the nature of the relationship in terms of the link between the impact of each of these approaches and efficiency of marketing services by selecting an intentional sample of 58 researches from the Directorate General of Traffic, one of the Iraqi Interior Ministry ins
... Show MoreTwo field experiments were carried out for cultivating yellow maize crop Zea mays L. during the autumn planting season 2019 in two sites with soils of different textures. The first site is a loamy texture in one of the fields of the Medhatia Agriculture Division, Babylon Governorate. The second was silty loam by an alluvial mixture in one of the fields of Al-Nouriah Research Station, Ministry of Agriculture located in Al-Nouriah sub-district, Al-Qadisiyah governorate. It was found through the results that the uniformity, efficiency, and adequacy of the irrigation efficiency of the sprinkler irrigation method is better than that of the sprinkler irrigation method, and it ranged between (88.6-88.7) for uniformity and (84-86)% of the irrigatio
... Show MoreThe main objective of this study is to experimentally investigate the effect of the CMC polymeric drag reducer on the pressure drop occurred along the annulus of the wellbore in drilling operation and investigate the optimum polymer concentration that give the minimum pressure drop. A flow loop was designed for this purpose consist from 14 m long with transparent test section and differential pressure transmitter that allows to sense and measure the pressure losses along the test section. The results from the experimental work show that increasing in polymer concentration help to reduce the pressure drop in annulus and the optimum polymer concentration with the maximum drag reducing is 0.8 kg/m3. Also increasing in flow rate a
... Show MoreThe poor hole cleaning efficiency could causes many problems such as high torque, drag, poor hydraulics and pipe stuck. These inherent problems result in an avoidable high operation cost which this study tried to address. In this study, the effect of cutting density on hole cleaning efficiency in deviated and horizontal wells was investigated. Experiments were conducted using 40 feet (12 m) long of flow loop made from iron and PVC. However, the test section was made from PVC with (5.1m) long and (4” ID) for outer pipe and (2” OD) inner pipe. The cutting transport ratio (CTR) was determined from weight measurements for each test. Cutting Transport Ratio has been investigated for effects of the following parameters; flow rate, cu
... Show More