Zigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh topology from earlier design until it supports a large number of end points (>64,000) with dynamic routing. The self-healing is done by removing a router from the network during operation, and seeing the end devices find an alternate path to communicate with the coordinator.
The study aimed to reach the best rating for the views and variables in the totals characterized by qualities and characteristics common within each group and distinguish them from aggregates other for the purpose of distinguishing between Iraqi provinces which suffer from deprivation, for the purpose of identifying the status of those provinces in the early allowing interested parties and regulators to intervene to take appropriate corrective action in a timely manner. Style has been used cluster analysis Cluster analysis to reach the best rating to those totals from the provinces that suffer from problems, where the provinces were classified, based on the variables (Edu
... Show MoreFolic acid and multivitamin tablets containing Aspergillus flavus Penicillia spp. and Cladosporia spores were prepared at a compression pressure of 148 MN/m2 and stored at 35°C under different relative humidifies (75,85, and 95)% within air tight containers, to study the effect of storage condition on them, as well as ,the estimation of the microbial level of the raw materials intended to be used in the two kinds of tablets . Result showed that some raw materials derived from natural origin were heavily contaminated with microorganism compared to that of synthetic origin ,the results also indicated the effect of relative humidity , types of fungal spore , and the hygroscopic nature of exicpient upon survival. Multivit
... Show MoreTest method was developed radioimmunotherapy to appoint in two groups of patients infected with a uterine tumor Great conditions in tumor tissue benign and malignant Ddh teacher radioactive iodine isotope
This work was conducted to study the oxidation of phenol in aqueous solution using copper based catalyst with zinc as promoter and different carrier, i.e. γ-Alumina and silica. These catalysts were prepared by impregnation method.
The effect of catalyst composition, pH (5.6-9), phenol to catalyst concentration ratio (2-0.5), air feed rate (30-50) ml/s, stirring speed (400-800) rpm, and temperature (80-100) °C were examined in order to find the best conditions for phenol conversion.
The best operating conditions which lead to maximum phenol conversion (73.1%) are : 7.5 pH, 4/6 phenol to catalyst concentration, 40 ml/s air feed rate, 600 rpm stirring speed, and 100 °C reaction temperature. The reaction involved an induction period
Bacteria strain H7, which produces flocculating substances, was isolated from the soil of corn field at the College of Agriculture in Abu-Ghrib/Iraq, and identified as Bacillus subtilis by its biochemical /physiological characteristics. The biochemical analysis of the partially purified bioflocculant revealed that it was a proteoglycan composed of 93.2 % carbohydrate and 6.1 % protein. The effects of bioflocculant dosage, temperature, pH, and different salts on the flocculation activity were evaluated. The maximum flocculation activity was observed at an optimum bioflocculant dosage of 0.2 mL /10 mL (49.6%). The bioflocculant had strong thermal stability within the range of 30-80 °C, and the flocculating activity was over 50 %. The biofloc
... Show MoreThis study aims to assess the removal efficiency andestablish the BOD5 and COD statisticalcorrelation of the sewage flowing in Al-Diwaniyah wastewater treatment plant in Iraq during the study period (2005-2016). The strength of the influent wastewater entering the plant varied from medium to high in strength. High concentrations of BOD5 and COD in the effluent were obtained due to the poor performance of the plant. This was observed from the BOD5 /COD ratios that did not confirm with the typical ratios for the treated sewage. To improve the performance of this plant, regression equations for BOD5 and COD removal percentages were suggested which can be used to facilitate evaluation of liquid waste and optimal control process. The equations
... Show MoreThis work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreA field experiment was conducted in an agricultural field in Al-Hindia district, Karbala governorate in a silty clay soil during the year 2020. The research included a study of two factors, the first is the depth of plowing at two levels, namely 13 and 20 cm, which represented the main blocks. The second is the tire inflation pressure at two levels, namely (70 and 140 kPa), which represented the secondary blocks. Slippage percentage, field efficiency, leaf area, and 300 grain weight were studied. The experiment was carried out using a split-plot system under a Randomized complete block design, at three replications. The tillage depth of 13 cm exceeds/transcend by giving it the least slippage of (11.01%), the highest field efficiency of (50.
... Show More