Preferred Language
Articles
/
eBb9locBVTCNdQwCvFe5
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregation process. In this paper, we have highlighted the gains of the existing schemes for node clustering based data aggregation along with a detailed discussion on their advantages and issues that may degrade the performance. Also, the boundary issues in each type of clustering technique have been analyzed. Simulation results reveal that the efficacy and validity of these clustering-based data aggregation algorithms are limited to specific sensing situations only, while failing to exhibit adaptive behavior in various other environmental conditions.

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 01 2017
Journal Name
Research Journal Of Pharmacy And Technology
Estimating the plain and negative tendonography techniques for evaluating injured tendon in rabbit
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Language Teaching And Research
The Effectiveness of Role Play Techniques in Teaching Speaking for EFL College Students
...Show More Authors

The paper investigates the impact of role-playing as a classroom technique on Iraqi EFL students’ speaking skill on Iraqi EFL students at the college level. The students are 40 college language students in University of Baghdad, College of Education Ibn-Rushd randomly chosen. Then, they were divided into two groups, experimental and control groups. Thirty questions were applied to both groups as a pre-test of speaking and the students asked to answer them orally. The experimental group was taught speaking skill of the targeted role-play technique while the control group was taught in traditional method. After 20 lessons of the teaching, the post-test of speaking was conducted in which the students in both groups were asked to answ

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (35)
Scopus Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Jan 01 2008
Journal Name
J Bagh College Of Dentistry
A comparative study of the sealing ability of two different obturation techniques with and without the use of sealers.
...Show More Authors

Background: The final stage of endodontic therapy is complete obturation of the root canal system to provide as perfect as possible at the cementodentinal junction of the apical foramen. The purpose of this in vitro study was to evaluate the sealing ability of injection molded thermoplasticized gutta percha and lateral condensation techniques with and without the use of sealers. Materials and Methods: Forty freshly extracted adult human maxillary central incisors with complete formed apices were utilized in this study. The teeth were randomly divided into four groups for evaluation of the apical seal. Group (1) lateral condensation gutta percha technique without sealer, (2) lateral condensation gutta percha technique with sealer, (3) Inject

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Effect of Heterogeneity on Recovery Factor for Carbonate Reservoirs. A Case Study for Mishrif Formation in West Qurna Oilfield, Southern Iraq
...Show More Authors

Oil recovery could be impacted by the relation between vertical permeability (Kv) and horizontal permeability (Kh) (Kv/Kh). 4816 plugs that have been getting hold of 18 wells of Mishrif formation in the West Qurna oilfield were used. Kv/Kh data provided some scatter, but the mean is ~1. Kv/Kh =1 was used for the Petrel model before upscaling according to the heterogeneity of each layer.

Kv/Kh values for Mishrif Formation in West Qurna Oilfield are 0.8 for relatively homogeneous, 0.4 for heterogeneous rock, and 0.1 for cap rocks (CRII).

   Eclipse TM was used for reservoir simulation. PVT and SCAL data e

... Show More
View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Influence of Teacher and Students Errors Correction Techniques on Students’ Achievement in English at College of Physical Education for Women
...Show More Authors

The research is an attempt to investigate experimentally the influence of teacher’s errors correction and students’ errors correction on teaching English at the College of Physical Education for Women. Errors are seen as a natural way for developing any language but teachers are puzzled the way they can correct these errors. So, this research gives some idea of using two types of errors correction. The sample of the research is female students of the first year stage at the College of Physical Education for Women of the academic year 2009-2010. The whole population of the research is (94) students while the sample is (64). Thus, the sample represents 68% from the population of the research. The sample represents It is hypothesized th

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 16 2024
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

The research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
International Journal Of Computing And Digital Systems
Digital Intelligence for University Students Using Artificial Intelligence Techniques
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Production mechanisms and their implications for Iraqi theater techniques
...Show More Authors

Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio

... Show More
View Publication Preview PDF
Crossref