Preferred Language
Articles
/
eBb9locBVTCNdQwCvFe5
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregation process. In this paper, we have highlighted the gains of the existing schemes for node clustering based data aggregation along with a detailed discussion on their advantages and issues that may degrade the performance. Also, the boundary issues in each type of clustering technique have been analyzed. Simulation results reveal that the efficacy and validity of these clustering-based data aggregation algorithms are limited to specific sensing situations only, while failing to exhibit adaptive behavior in various other environmental conditions.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 01 2015
Journal Name
2015 9th Malaysian Software Engineering Conference (mysec)
Factors for communication technologies selection within virtual software teams
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Nov 19 2024
Journal Name
Aip Conference Proceedings
CT scan and deep learning for COVID-19 detection
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Performance application of ultraviolet disinfection technique for raw water
...Show More Authors
Abstract<p>Microbial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposed Audit Program for Automated Clearing House System (ACH)
...Show More Authors

إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة  بين  المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ

... Show More
View Publication
Crossref
Publication Date
Thu Mar 04 2021
Journal Name
Journal Of Craniofacial Surgery
Outcome Assessment for Surgical Reconstruction of Mandibular Continuity Defects
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Interdisciplinary Mathematics
Enforcement for the partition (7, 7, 4; 0, 0)
...Show More Authors

View Publication
Scopus (17)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jul 23 2023
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Future of Engineered Phage Therapy for Clostridium difficile Infections
...Show More Authors

Bacteriophages have the potential to eliminate both antibiotic-resistant and sensitive bacteria; as a result, they have become a major focus of such research. In contrast to antibiotics, which assault the entire bacterial population without discrimination, bacteriophages have a limited set of characteristics that allow them to target infectious microbes while avoiding friendly species (commensal microbiota). Nevertheless, large groups of naturally occurring bacteriophages that are well-differentiated and selective for the most clinically recognized pathogenic bacterial strains are required. Utilizing genetic engineering techniques that modify the target phage genome to synthesize phages with known characteristics in a brief period o

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Wed Aug 10 2022
Journal Name
Mathematical Statistician And Engineering Applications
Results for the Groups SL(2,34 ) and SL(2,36 )
...Show More Authors