Preferred Language
Articles
/
alkej-576
Improving the Network Lifetime in Wireless Sensor Network for Internet of Thing Applications
...Show More Authors

Mobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kernel-based fuzzy C-means clustering algorithm (KFCM) is adopted to cluster sensor nodes, while a cluster head (CH) is selected for each cluster based on a fuzzy logic system. Results depicts that the new work performs better than the existing algorithms (as Low Energy Adaptive Cluster Hierarchy-Mobile (LEACH-M) and Low Energy Adaptive Cluster Hierarchy-Mobile Enhancement (LEACH-ME)) in terms of network lifetime, energy consumption, packet transmission and stability period.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Vigilance and strategic role in improving the level of nursing services / Applied Research in Ghazi al-Hariri Hospital
...Show More Authors

The current research aims to focus on strategic vigilance dimensions and contained (environmental vigilance, technological vigilance, competitive vigilance, vigilance marketing) to improve nursing services, which include a) the quality, timeliness, problem-solving and decision-making, relationships with others, leadership skills) and measure the degree link and influence between strategic vigilance in the hospital respondent and improve nursing service that the problem of the research lies in the weakness of strategic plans and health organizations in general and the hospital surveyed (martyr Ghazi al-Hariri), in particular, the lack of awareness of the hospital researched strategy vigilant management to improve nursing services,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of The Mechanical Behavior Of Materials
Simulation and assessment of water supply network for specified districts at Najaf Governorate
...Show More Authors
Abstract<p>This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand </p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Baghdad Science Journal
Compact MIMO Slots Antenna Design with Different Bands and High Isolation for 5G Smartphone Applications
...Show More Authors

 In this paper, two elements of the multi-input multi-output (MIMO) antenna had been used to study the five (3.1-3.55GHz and 3.7-4.2GHz), (3.4-4.7 GHz), (3.4-3.8GHz) and (3.6-4.2GHz) 5G bands of smartphone applications that is to be introduced to the respective US, Korea, (Europe and China) and Japan markets. With a proposed dimension of 26 × 46 × 0.8 mm3, the medium-structured and small-sized MIMO antenna was not only found to have demonstrated a high degree of isolation and efficiency, it had also exhibited a lower level of envelope correlation coefficient and return loss, which are well-suited for the 5G bands application. From the fabrication of an inexpensive FR4 substrate with a 0.8 mm thickness level, a loss tang

... Show More
View Publication Preview PDF
Scopus (10)
Scopus Clarivate Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Solid State Technology
Image Fusion Using A Convolutional Neural Network
...Show More Authors

Image Fusion Using A Convolutional Neural Network

Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FILTRATION MODELING USING ARTIFICIAL NEURAL NETWORK (ANN)
...Show More Authors

In this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 07 2022
Journal Name
2022 Iraqi International Conference On Communication And Information Technologies (iiccit)
Vehicular Ad-hoc Network (VANET) – A Review
...Show More Authors

This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.

View Publication
Scopus (7)
Crossref (4)
Scopus Crossref