Preferred Language
Articles
/
bsj-9707
An Improved Cuckoo Search Algorithm for Maximizing the Coverage Range of Wireless Sensor Networks
...Show More Authors

The issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting regional monitoring into point monitoring utilizing the discretization method in WSN. In the experiments, the ICS-PSO-OBL with the standard CS and three CS variants (MACS, ICS-2, and ICS) are utilized to execute the simulation experiment under different numbers of nodes (20 and 30, respectively). The experimental results reveal that the optimized coverage of ICS-PSO-OBL is 18.36%, 7.894%, 15%, and 9.02% higher than that of standard CS, MACS, ICS-2, and ICS when the number of nodes is 20. Moreover, it is 16.94%, 9.61%, 12.27%, and 7.75% higher when the quantity of nodes is 30, the convergence speed of ICS-PSO-OBL, and the distribution of nodes is superior to others.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Applying Social Stories in Developing Social Interaction Skills among Children with Autism Spectrum Disorder
...Show More Authors

Abstract

The current research aims to identify the effectiveness of social stories in increasing social interaction among children with an autism spectrum disorder. The researcher used the single-subject design methodology (Single Subject Designs, SSD) with

 (A-B) design to answer the research questions. The study sample consisted of (3) children with autism spectrum disorder enrolled in a transit daycare center in the Asir region, Saudi Arabia. The results of the study showed that there is a positive functional relationship between social stories and play to increase social interaction among children with autism spectrum disorder, which contributed to the acquisition and generalization of this behav

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Wed Jun 27 2018
Journal Name
Wireless Communications And Mobile Computing
Developing a Video Buffer Framework for Video Streaming in Cellular Networks
...Show More Authors

This work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video

... Show More
View Publication
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks
...Show More Authors

Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Media Coverage of Yazidi Women in the Iraqi Press Analytical Study in Al-Mada Newspaper: غادة حسين العاملي
...Show More Authors

This research reveals the treatment mechanisms followed in the media for covering the topic of displacement and captivity of Yazidi in the Iraqi press, through studying all the publishing in one of the Iraqi newspapers concerning the research subject. The research problem is in the following questions:

  • What are the journalistic arts that are tackled by the newspaper concerning the subject of the Yazidi women?
  • What are the editing forms for the model of the press subjects that have been employed about the event and what are its sources?
  • What are the highlighting means used in presenting the subjects within the journalistic arts?
  • What are the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Swarm And Evolutionary Computation
Improving the performance of evolutionary multi-objective co-clustering models for community detection in complex social networks
...Show More Authors

Scopus (34)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun Dec 19 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
FIRST PHOTOGRAPHIC RECORDS AND NEW DISTRIBUTION RANGE OF THE ENDANGERED LONG-TAILED NESOKIA NESOKIA BUNNII (KHAJURIA, 1981)
...Show More Authors

In the 1970s, the world knew the long-tailed nesokia Nesokia bunnii (Khajuria, 1981) (Rodentia, Muridae) from the Mesopotamian marshes of Garden of Eden in Southern Iraq. This distinct rodent was known from only five voucher specimens collected at the confluence of Tigris and Euphrates Rivers in southern Iraq while its occurrence in Southwestern Iran had
never been reported. In the 1990s, a large extent of its natural habitat was catastrophically desiccated and the animal was last seen in the 1970s. Since then, the status of this elusive rodent was shrouded in mystery. In 2007, an extraordinary photograph of a carcass of this species came to the light from Hawizeh Marsh which was interpreted as concrete evidence of the species’ pers

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jun 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
CONCHOLOGICAL VARIABILITY OF TERRESTRIAL MOLLUSK CHONDRULOPSINA FEDTSCHENKOI (ANCEY, 1886) (GASTROPODA, PULMONATA, ENIDAE) FROM THE ZARAFSHAN RANGE, UZBEKISTAN
...Show More Authors

The article presents the results of studying the conchological variability of the terrestrial mollusk Chondrulopsina fedtschenkoi (Ancey, 1886), known to occur in three regions of the Zaravshan Range (Central Asia): the Urgutsay Gorge, the vicinity of the Gissarak Reservoir and the Ingichka-Irmak Gorge. Conchological variability was determined based on statistical analysis. The climate of the three regions is different, and environmental factors have led to changes in the mollusk shell. The shells have changed in response to environmental factors, these are their adaptive traits for survival; the variability of conchological features is also reflected in the color of the shell, and the intensive development of the color of the shell in m

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of Petroleum Research And Studies
Selection of an Optimum Drilling Fluid Model to Enhance Mud Hydraulic System Using Neural Networks in Iraqi Oil Field
...Show More Authors

In drilling processes, the rheological properties pointed to the nature of the run-off and the composition of the drilling mud. Drilling mud performance can be assessed for solving the problems of the hole cleaning, fluid management, and hydraulics controls. The rheology factors are typically termed through the following parameters: Yield Point (Yp) and Plastic Viscosity (μp). The relation of (YP/ μp) is used for measuring of levelling for flow. High YP/ μp percentages are responsible for well cuttings transportation through laminar flow. The adequate values of (YP/ μp) are between 0 to 1 for the rheological models which used in drilling. This is what appeared in most of the models that were used in this study. The pressure loss

... Show More
View Publication
Crossref (2)
Crossref