Preferred Language
Articles
/
bsj-6086
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the sink. By utilizing Intel Berkeley Research Lab (IBRL) dataset, the efficiency of the proposed method was measured. The experimental findings illustrate the benefits of the proposed method as it reduces the overhead on the sensor node level up to 1.25% in remaining data and reduces the energy consumption up to 93% compared to prefix frequency filtering (PFF) and ATP protocols.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 12 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Determining Grades and Standard Levels for the Most Important Physical and Motor Abilities of Sepak Takraw Juniors in Iraq
...Show More Authors

(Sepak takraw) is a game that mixes football and volleyball, it is played on a court similar to a badminton court, in which players have the right to play the ball with any part of the body except the arm and hand. The object of the game is to return the ball to the opponent's court and score a point. Since it is a newly emerging game, all aspects related to it must be studied and covered in order to reach the highest levels, and it is known that each game or sporting activity has its own physical and motor capabilities, which is important to determine the level of technical performance, as the game's abilities contribute to mastering the skills. The importance of research in determining standard levels of physical and motor abilities for y

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating Parameters of General Linear Model in Presence of Heteroscedastic Problem and High Leverage Points
...Show More Authors

Linear regression is one of the most important statistical tools through which it is possible to know the relationship between the response variable and one variable (or more) of the independent variable(s), which is often used in various fields of science. Heteroscedastic is one of the linear regression problems, the effect of which leads to inaccurate conclusions. The problem of heteroscedastic may be accompanied by the presence of extreme outliers in the independent variables (High leverage points) (HLPs), the presence of (HLPs) in the data set result unrealistic estimates and misleading inferences. In this paper, we review some of the robust

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF
Publication Date
Sat Mar 21 2020
Journal Name
Journal Of Engineering
Development of Iraqi license plate recognition system based on Canny edge detection method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo

... Show More
Publication Date
Sat Dec 17 2022
Journal Name
Iraqi Journal Of Laser
PDF S and U shape offset studying of the refractive index sensor based on coreless fiber: Aya R. Mejble* Hanan J.Taher
...Show More Authors

Abstract:  Two different shapes of offset optical fiber was studied based on coreless fiber for refractive index (RI)/concentration (con.) measurement, and compare them. These shapes are U and S-shapes, both shapes structures were formed by one segment of coreless fiber (CF) was joined between two single mode (SMF) lead in /lead out with the same displacement (12.268µm) at both sides, the results shows the high sensitive was achieved in a novel S-shape equal 98.768nm/RIU, to our knowledge, no one has ever mentioned or experienced it, it’s the best shape rather than the U-shape which equal 85.628nm/RIU. In this research, it was proved that the offset form has a significant effect on the sensitivity of the sensor. Addi

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
A novelty Multi-Step Associated with Laplace Transform Semi Analytic Technique for Solving Generalized Non-linear Differential Equations
...Show More Authors

 

   In this work, a novel technique to obtain an accurate solutions to nonlinear form by multi-step combination with Laplace-variational approach (MSLVIM) is introduced. Compared with the  traditional approach for variational it overcome all difficulties and enable to provide us more an accurate solutions with extended of the convergence region as well as covering to larger intervals which providing us a continuous representation of approximate analytic solution and it give more better information of the solution over the whole time interval. This technique is more easier for obtaining the general Lagrange multiplier with reduces the time and calculations. It converges rapidly to exact formula with simply computable terms wit

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref