Wireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates in the following manner: CHs are dynamically selected in each transmission round based on the nodes' CVs. The algorithm considered the patient's condition classification to guarantee safety and attain a response speed appropriate for their current state. So, data is categorized into Very-Critical, Critical, and Normal data classes using the supervised learning vector quantization (LVQ) classifier. Very Critical data is sent to the emergency center to dispatch an ambulance, Critical data is transmitted to a doctor, and Normal data is sent to a data center. This methodology promotes efficient and reliable intra-network communication, ensuring prompt and precise data transmission, and reducing frequent recharging. Comparative analyses reveal that the proposed algorithm outperforms ERRS (Energy-Efficient and Reliable Routing Scheme) and LEACH (low energy adaptive clustering hierarchy) regarding network longevity by 27% and 33%, augmenting network stability by 12% and 45% over the aforementioned protocols, respectively. The performance was conducted in OMNeT++ simulator
Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show MoreDeep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f
... Show MoreHuman values are the most important concepts that the interest of society has to relay on these conceptual values. Any society will not be stabilized unless adheres to the right principles and values, all nations need such principles and values to stabilize. If any society doesn’t implement the human values that monotheistic religions urges equality between human, the far the society from the religious principles, the less there would be valence between human. The valence is urgent necessity in the current time. The far people get away from values and principles, the more they lose their freedom and dignity, therefore individual has to live with dignity and respect through the adherence to these values and principles. Apparently, equal
... Show MoreAge and BMI may be used to diagnosis of thyroid autoimmune disease. One hundred Iraqi women with age ranged from 18 to 60 years participate in this research, 50 of them were hypothyroidism patients, 30 were hyperthyroidism patients and the other 20 were euthyroidism served as controls. Blood samples were collected from the studied subjects to determine thyroid profile [free triiodothyronine (FT3), free tetraiodothyronine (FT4) and thyroid stimulating hormone (TSH)], thyroid antibodies [anti-thyroid peroxidase (anti-TPO), anti-thyroglobulin (anti-Tg), and anti-thyroid stimulating hormone receptor (anti-TSHR)], and levels of vitamin D (vit D), calcium (Ca), and phosphorus (P) using different analysis techniques. When the effect of age
... Show MoreAbstract
This study was to demonstrate the role-use planning scientific methods is disabled and little used in the planning and follow-up construction of vital projects in the province of Baghdad, including network planning methods, in order to find the optimal time to finish the project in light of the resources available and the budget set for it, in the current research has been used the most prominent network planning methods and two stylistic (CPM / PERT), was the application of the critical path method on standard-design school project (traditional) to draw Action Network according to confirmed times for the activities of the project and account his Crashing time , It was Pert technique applied to the project hemato
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThe laws of the three religions tend to extend the rules and foundations of coexistence, and this is achieved in achieving the values and principles that these laws have nourished in all societies.
Our research deals with a major problem that has broken out in our societies, namely (disturbing the balance of values and behavioral standard between people), and perhaps one of the greatest causes of the problem is to move away from the correct divine discourse and sound approach, as well as corruption of common sense and the violation of its rules and found principles in the hearts of people.