Preferred Language
Articles
/
bsj-5948
WOAIP: Wireless Optimization Algorithm for Indoor Placement Based on Binary Particle Swarm Optimization (BPSO)
...Show More Authors

Optimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received signal strength (RSS) measurements simulated using Wireless InSite (WI) software were considered in the test case study by comparing the results collected from WI with the present wireless simulated physical AP deployment of the targeted building - Computer Science Department at University of Baghdad. The performance evaluation of WOAIP shows an increase in terms of AP placement and optimization distinguished in order to increase the wireless coverage ratio to 92.93% compared to 58.5% of present AP coverage (or 24.5% coverage enhancement on average).

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL).
This HDL program is then used to configure an FPGA to implement the designed circuit.

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (24)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
The Symmetries of the Interior Design of Fast Food Restaurants
...Show More Authors

The present research deals with the study of the symmetries of the design of interior spaces in fast food restaurants in terms of formality as it is an important element and plays a direct role in the spatial configuration, which is designed in both of its performance, aesthetic and expressive aspects. Since the choice of shapes is a complex subject that has many aspects imposed by functional and aesthetic correlations, the problem of the research is represented by the following question: (To what extent can the symmetries of the interior design be used in the spaces of fast food restaurants?)
The research acquires its importance by contributing to the addition of knowledge to researchers, scholars, companies and the specialized publ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 18 2022
Journal Name
Al-academy
انعكاسات المرايا وتأثيرها في التصميم الداخلي
...Show More Authors
لم يعد اي فضاء سكني يخلو من المرايا التي قد يكون استخدامها وظيفي بحت ولكن وبتطور الحياة اصبحت للمرايا فوائد ومعالجات جماليه ووظيفيه معا ,من هنا جاءت اهمية البحث حيث جاء البحث بثلاثة فصول:الفصل الاول: تم من خلاله تحديد مشكلة البحث والتي تمثلت بالتساؤل(هل هناك تاثير مباشر لانعكاسات المرايا في التصميم الداخلي).كما تم تحديد اهمية البحث والتي تكمن في فتح ابواب معرفيه للدارسين في مجال التصميم الداخلي ل
... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2021
Journal Name
Al-academy
Recycling waste toys to accessories suggested uniform for educational units in kindergarten stages
...Show More Authors

This research considers the preservation of environment through recycling old toys. This is achieved by transforming the old toys into educational clothing accessories for kindergarten stages. The research methodology adapts both descriptive and applied approaches. The research questionnaire targeted a sample of 35 teachers to collect information about the waste toys in kindergarten. Also, another sample of 30 teachers and mothers were targeted to measure the suitability of the clothing designs for the early childhood stages. The results shows that both teachers and mothers were well satisfied with clothing accessories designed with the toys waste. This concept contributes to limiting the pollution caused by toys and could save time, eff

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Study of the Inter-Particle Expectation Values for Inter and Outer Shell: Khalil H. Al-Bayati|Ban H. Al-Asaad|Baidaa S. H.
...Show More Authors

In this research the Inter-Particle Expectation Values have been studied for atomics Helium (He) and Beryllium (Be) also for He-like ions, Be-like ions (Li-1, B+1? Li+1, Be+2, B+3) by using Hartree-Fock wave functions, We compared the results to some ions which have the same atomic number from each group with atomic number, We compared the results with published calculations to the last studied .

View Publication
Crossref
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing Data in Wireless Body Area Network Using Hyper-Chaotic Zhou System
...Show More Authors

  E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Sensors
Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review
...Show More Authors

The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC) method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (16)
Scopus Clarivate Crossref