Preferred Language
Articles
/
Lhegoo0BVTCNdQwCsBeE
A comparative study of Gaussian mixture algorithm and K-means algorithm for efficient energy clustering in MWSN
...Show More Authors

Wireless sensor networks (WSNs) represent one of the key technologies in internet of things (IoTs) networks. Since WSNs have finite energy sources, there is ongoing research work to develop new strategies for minimizing power consumption or enhancing traditional techniques. In this paper, a novel Gaussian mixture models (GMMs) algorithm is proposed for mobile wireless sensor networks (MWSNs) for energy saving. Performance evaluation of the clustering process with the GMM algorithm shows a remarkable energy saving in the network of up to 92%. In addition, a comparison with another clustering strategy that uses the K-means algorithm has been made, and the developed method has outperformed K-means with superior performance, saving energy of up to 92% at 4,500 rounds.

Scopus Crossref
View Publication
Publication Date
Fri Dec 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Working Memory Classification Enhancement of EEG Activity in Dementia: A Comparative Study
...Show More Authors

The purpose of the current investigation is to distinguish between working memory ( ) in five patients with vascular dementia ( ), fifteen post-stroke patients with mild cognitive impairment ( ), and fifteen healthy control individuals ( ) based on background electroencephalography (EEG) activity. The elimination of EEG artifacts using wavelet (WT) pre-processing denoising is demonstrated in this study. In the current study, spectral entropy ( ), permutation entropy ( ), and approximation entropy ( ) were all explored. To improve the  classification using the k-nearest neighbors ( NN) classifier scheme, a comparative study of using fuzzy neighbourhood preserving analysis with -decomposition ( ) as a dimensionality reduction technique an

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of some methods for estimating the parameters of the binary logistic regression model using the genetic algorithm with practical application
...Show More Authors

Abstract

   Suffering the human because of pressure normal life of exposure to several types of heart disease as a result of due to different factors. Therefore, and in order to find out the case of a death whether or not, are to be modeled using binary logistic regression model

    In this research used, one of the most important models of nonlinear regression models extensive use in the modeling of applications statistical, in terms of heart disease which is the binary logistic regression model. and then estimating the parameters of this model using the statistical estimation methods, another problem will be appears in estimating its parameters, as well as when the numbe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Robot Arm Path Planning Using Modified Particle Swarm Optimization based on D* algorithm
...Show More Authors

Abstract

Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Variable Selection Using aModified Gibbs Sampler Algorithm with Application on Rock Strength Dataset
...Show More Authors

Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A Comparative Study on the Double Prior for Reliability Kumaraswamy Distribution with Numerical Solution
...Show More Authors

This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Estimation of Water and Energy Saving by Rainwater Harvesting: Sulaimani City as a Case Study
...Show More Authors

Rainwater harvesting could be a possible solution to decrease the consequences of water scarcity and energy deficiency in Iraq and the Kurdistan Region of Iraq (KRI). This study aims to calculate the water and energy (electricity) saved by rainwater harvesting for rooftops and green areas in Sulaimani city, KR, Iraq. Various data were acquired from different formal entities in Sulaimani city. Moreover, Google Earth and ArcMap 10.4 software were used for digitizing and calculating the total rooftop and green areas. The results showed that for the used runoff coefficients (0.8 and 0.95), the harvested rainwater volumes were 2901563 and 12197131 m³ during the study period (2005 – 2006) and (2019-2020). Moreover, by compa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Sep 22 2025
Journal Name
Alrafidain Of Law
The Effects of the research and technology development contract -A comparative study-
...Show More Authors

Researching the effects of the research and technological development contract, determining its extent and demarcating the boundaries of the obligations imposed in it, is the cornerstone of economic growth and development, because defining these obligations removes the ambiguity and conflict between interests, by stating the rights owed to each party and even trying to reconcile them, or impose protection by specifying guarantees that are compatible with the essence of the R&D contract, For the purpose of studying the subject thoroughly, we will divide this research into two sections. The first is devoted to identifying the parties to the research and technological development contract. As for the other topic, we will explain the obligation

... Show More
View Publication
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Comparative Study between Transcutaneous Bilirubinometry and Total Serum Bilirubin Measurement in Jaundiced Newborns
...Show More Authors

Background: Drawing blood to measure total serum bilirubin is painful & time consuming. Transcutaneous bilirubinometer working by multiwavelength spectral reflectance from the skin surface on forehead or upper sternum is a quick & painless technique. 

Objectives: to compare the effectiveness of transcutaneous (over the upper sternum and forehead) and serum bilirubin measurement of neonate with jaundice.

Subjects and Methods: This is a cross sectional prospective study. It enrolled 175 jaundiced neonates & excluded those exposed to phototherapy. It was conducted at Child Central Teaching Hospi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
The other day in the Holy Quran and the four Gospels: A comparative study
...Show More Authors

The other day in the Holy Quran and the four Gospels

View Publication Preview PDF