Optimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received signal strength (RSS) measurements simulated using Wireless InSite (WI) software were considered in the test case study by comparing the results collected from WI with the present wireless simulated physical AP deployment of the targeted building - Computer Science Department at University of Baghdad. The performance evaluation of WOAIP shows an increase in terms of AP placement and optimization distinguished in order to increase the wireless coverage ratio to 92.93% compared to 58.5% of present AP coverage (or 24.5% coverage enhancement on average).
Electrocoagulation process was employed for the treatment of river water flows in Iraq. In this study, a batch Electrocoagulation process was used to treat river water taken from Al - Qadisiyah water treatment plant. electrolysis time, voltage and inter-electrode spacing were the most important parameters to study . A statistical model was developed using the RSM model. The optimum condition after studying the parameter effect the process was 1 cm separating, 30 volts . The RSM model shows the ideal condition of removal for both the TSS and turbidity at 1 cm, 20 volts and 55 min.
Continuous improvement, or Kaizen, is a philosophy that is based on the idea of continuously finding ways to improve things. From this point of view, continuous improvement is not limited to the quality of products or services but it also applies to all the processes in the organization. During the last two decades several continuous improvement approaches were developed and marketed. The advocates of each approach claim that their approach is the best, however all the approaches had their own advantages and disadvantages and had their share of criticism. The important question is how to choose the right continuous improvement approach? This research work addresses the philosophy, the concepts, the assumptio
... Show MoreInternational companies are striving to reduce their costs and increase their profits, and these trends have produced many methods and techniques to achieve these goals. these methods is heuristic and the other Optimization.. The research includes an attempt to adapt some of these techniques in the Iraqi companies, and these techniques are to determine the optimal lot size using the algorithms Wagner-Whitin under the theory of constraints. The research adopted the case study methodology to objectively identify the problem of research, namely determining lot size optimal for each of the products of electronic measurement laboratory in Diyala and in light of the bottlenecks in w
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreObjectives To assess the feasibility and accuracy of a new prototype robotic implant system for the placement of zygomatic implants in edentulous maxillary models. Methods The study was carried out on eight plastic models. Cone beam computed tomographs were captured for each model to plan the positions of zygomatic implants. The hand-eye calibration technique was used to register the dynamic navigation system to the robotic spaces. A total of 16 zygomatic implants were placed, equally distributed between the anterior and the posterior parts of the zygoma. The placement of the implants (ZYGAN®, Southern Implants) was carried out using an active six-jointed robotic arm (UR3e, Universal Robots) guided by the dynamic navigation coordinate tran
... Show Moresingle and binary competitive sorption of phenol and p-nitrophenol onto clay modified with
quaternary ammonium (Hexadecyltrimethyl ammonium ) was investigated to obtain the
adsorption isotherms constants for each solutes. The modified clay was prepared from
blending of local bentonite with quaternary ammonium . The organoclay was characterized
by cation exchange capacity. and surface area. The results show that paranitrophenol is
being adsorbed faster than phenol . The experimental data for each solute was fitted well with
the Freundlich isotherm model for single solute and with the combination of Freundlich-
Langmuier model for binary system .
The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show More