Preferred Language
Articles
/
bRbxlocBVTCNdQwCo1eZ
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
...Show More Authors

In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication cost. Unlike MSL* which chooses all normal nodes found in the neighbor, the proposed scheme uses set theory to only select intersected nodes. To evaluate our method, we simulate in our proposed scheme the use of the same MSL* settings and simulators. From the simulation, we find out that our proposed scheme is able to reduce communication cost—the number of messages sent—by a minimum of 0.02 and a maximum of 0.30 with an average of 0.18, for varying node densities from 6 to 20, while nonetheless able to retain similar MSL* accuracy rates.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 05 2020
Journal Name
Irrigation And Drainage
ECONOMIC ASSESSMENT OF DUYRIDGE DAM AS A WATER‐HARVESTING SCHEME IN IRAQ
...Show More Authors
Abstract<p>Iraq, home of the Tigris and Euphrates rivers, has survived an extreme deficiency of surface water assets over the years. The gap is due to the decline of the Iraqi water share every year, as well as a high demand for water use from different sectors, particularly agriculture.</p><p>Dam development has long given significant economic benefits to Iraq in circulating low‐priced electricity and supporting low‐income farmers by supplying them with a free irrigation system (Zakaria et al, 2012). This encouraged domestic consumption and investment.</p><p>Despite the fact that numerous advantages are expected from dam construction, it should be painstakingly assessed, utilizing cost</p> ... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2005
Journal Name
Journal Of The College Of Languages (jcl)
Le professeur Taranne et La non-Communication
...Show More Authors

Le professeur Taranne et La non-Communication

View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Digital technologies in the means of communication
...Show More Authors

Modern digital technologies have affected the means of communication in terms of structure, function and methods of dealing with them, and the communication process has changed, becoming bilateral, reciprocal and interactive, after it was one-way and limited in circulation and the roles changed, so the receiver became the sender and reversed is correct, and the culture of the active user and the participant spread, and the communication process became continuous.
The international information network has provided new electronic channels in the media and communication that are not known and opened a new era for these means, which led to a trend towards digital media in an unprecedented way.
The new communication platforms are the re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Wireless channel-based ciphering key generation: effect of aging and treatment
...Show More Authors

Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Estimating Angle of Arrival (AOA) for Wideband Signal by Sensor Delay Line (SDL) and Tapped Delay Line (TDL) Processors
...Show More Authors

Angle of arrival (AOA) estimation for wideband signal becomes more necessary for modern communication systems like Global System for Mobile (GSM), satellite, military applications and spread spectrum (frequency hopping and direct sequence). Most of the researchers are focusing on how to cancel the effects of signal bandwidth on AOA estimation performance by using a transversal filter (tap delay line) (TDL). Most of the researchers were using two elements array antenna to study these effects. In this research, a general case of proposed (M) array elements is used. A transversal filter (TDL) in phase adaptive array antenna system is used to calculate the optimum number of taps required to compensate these effect. The propo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Implementation of Optical Coherent Communication System between Two Computers
...Show More Authors

This work represents implementation and investigation of optical coherent communication system between two computers. A single mode optical fiber is selected as transmission medium. The data are sent via the RS-232 standard interface with a bit rate of 9.6 kbps from personal computer (PC1) by line receive to convert the data from electrical levels (-12/+12 V) into TTL level (0/5 V). The modulation of this data was accomplished by internal modulation using laser diode type (HFCT-5208M) 1310 nm wavelength. The optical D-coupler was used to combine the optical signal that come from laser source with optical signal of laser local oscillator (OTS-304XI) at 1310/1550 nm wavelength to obtain coherent (homodyne and heterodyne) detection respective

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Study the effect of Iraqi weather parameter in FSO communication using different wavelength (650, 532) nm
...Show More Authors

Light has already becomes a popular means of communication, and the high-bandwidth data into free space without the use of wires. A great idea took us to design a new system for transmitting sound through free space at (650, 532) nm wavelengths using reflective mirrors under different atmospheric conditions. The study showed us the effect of various weather factors (temperature, wind speed and humidity) on these wavelengths for different distances. As well as studying the attenuation caused by long-distance laser and beam divergence, A reflective dish was used to focus the spot of the laser beam on the photocell. Results were discussed under the effect of these factors and the attenuation resulting from the beam divergence. Thus, the sys

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Physics
Investigation of Radio Frequency Signal Propagation of Wireless Services in Oyo, Oyo State, South Western Nigeria
...Show More Authors

This study reported the investigation of the Radio Frequency (RF) signal propagation of Global System for Mobile Communications (GSM) coverage in Emmanuel Alayande College of Education (EACOED), Oyo, Oyo State, Nigeria. The study aims at amplifying the quality of service and augment end users' sensitivity of the wireless services operation. The drive test method is adopted with estimation of coverage level and received signal strength. The Network Cell Info Lite application installed in three INFINIX GSM mobile phones was employed to take the measurement of the signal strength received from the transmitting stations of different mobile networks. The results of the study revealed that MTN has the maximum signal strength with a mean value

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Classroom communication in art education lessons between concept and function
...Show More Authors

The issue of communication and communication is receiving increasing attention in both contemporary studies and educational literature, and these studies emphasize the importance of studying communication within the classroom, which inevitably applies to the importance of relationships and tensions in the field of teaching art in particular because it is an emotional field that provides an opportunity for communication competencies and skills to be prominent and take Its wide scope, both among the students themselves and between teachers and students. The means of communication are the vessel in which the cultural relations and the commonalities between people revolve. The process of building relationships between students depends in man

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus