Preferred Language
Articles
/
ijp-1014
Investigation of Radio Frequency Signal Propagation of Wireless Services in Oyo, Oyo State, South Western Nigeria
...Show More Authors

This study reported the investigation of the Radio Frequency (RF) signal propagation of Global System for Mobile Communications (GSM) coverage in Emmanuel Alayande College of Education (EACOED), Oyo, Oyo State, Nigeria. The study aims at amplifying the quality of service and augment end users' sensitivity of the wireless services operation. The drive test method is adopted with estimation of coverage level and received signal strength. The Network Cell Info Lite application installed in three INFINIX GSM mobile phones was employed to take the measurement of the signal strength received from the transmitting stations of different mobile networks. The results of the study revealed that MTN has the maximum signal strength with a mean value of - 68.33 dBm, directly followed by Globacom (-80.41 dBm) and Airtel with -83.13 dBm. The Airtel signal has a conspicuously invariable poor performance with coverage level of 41.66 %. Conversely, the MTN and Globacom signal reception are observed to surpass the Airtel network within the college premises with 83.33 % and 60.41 % coverage level respectively. This implies that the signal quality for MTN and Globacom networks were comparatively disseminated within the college with inconsequential fluctuations in quality while Airtel signal is subsided and weaken. The poor performance in some areas was due to the presence of physical impediments and far distances location of base station antennas in the promulgation locations. This study therefore suggested that Airtel and Globacom Base Transceiver Stations (BTS) should be positioned within the college to improve good network reportage level.     

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2012
Journal Name
I-manger's Journal On Information Technology
A MODULE FOR ENHANCING RECOGNITION SYSTEM FOR QR CODE SCANNED IMAGE
...Show More Authors

A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.

Publication Date
Fri Sep 01 2017
Journal Name
International Research Journal Of Engineering And Technology
A POWERFUL AUTOMATED IMAGE INDEXING AND RETRIEVAL TOOL FOR SOCIAL MEDIA Sample
...Show More Authors

The Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst

... Show More
Preview PDF
Publication Date
Fri Oct 24 2014
Journal Name
Journal Of Chemical And Pharmaceutical Research
Synthesis, characterization and antimicrobial activities of [Fe(II), Co(II), Ni(II),Cu(II) and Zn(II)] mixed ligand complexes schiff base derived from amoxicillin drug and 4-(dimethylamino)benzaldehyde with nicotinamide
...Show More Authors

New Schiff base ligand (E)-6-(2-(4-(dimethylamino)benzylideneamino)-2-(4-hydroxyphenyl)acetamido)-3,3- dimethyl-7-oxo-4-thia-1- azabicyclo[3.2.0]heptane-2-carboxylic acid = (HL) was synthesized via condensation of Amoxicillin and 4(dimethylamino)benzaldehyde in methanol. Figure -1 Polydentate mixed ligand complexes were obtained from 1:1:2 molar ratio reactions with metal ions and HL, 2NA on reaction with MCl2 .nH2O salt yields complexes corresponding to the formulas [M(L)(NA)2Cl],where M=Fe(II),Co(II),Ni(II),Cu(II),and Zn(II), A=nicotinamide .

Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis and identification of some new N-substituted quinazoline-4-one, thiazine-4-one and tetrazoline rings incorporating N-ethyl-2-(benzylthio)benzimidazole acetate and study their application as anti-oxidant agent
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Analysing Iraqi Railways Network by Applying Specific Criteria Using the GIS Techniques
...Show More Authors

The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Inorganica Chimica Acta
Synthesis, characterisation and electrochemistry of eight Fe coordination compounds containing substituted 2-(1-(4-R-phenyl-1H-1,2,3-triazol-4-yl)pyridine ligands, R = CH3, OCH3, COOH, F, Cl, CN, H and CF3.
...Show More Authors

Eight different Dichloro(bis{2-[1-(4-R-phenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})iron(II) compounds, 2–9, have been synthesised and characterised, where group R=CH3 (L2), OCH3 (L3), COOH (L4), F (L5), Cl (L6), CN (L7), H (L8) and CF3 (L9). The single crystal X-ray structure was determined for the L3 which was complemented with Density Functional Theory calculations for all complexes. The structure exhibits a distorted octahedral geometry, with the two triazole ligands coordinated to the iron centre positioned in the equatorial plane and the two chloro atoms in the axial positions. The values of the FeII/III redox couple, observed at ca. −0.3 V versus Fc/ Fc+ for complexes 2–9, varied over a very small potential range of 0.05 V.

... Show More
Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
On Hereditarily Codiskcyclic Operators
...Show More Authors

Many codiskcyclic operators on infinite-dimensional separable Hilbert space do not satisfy the criterion of codiskcyclic operators. In this paper, a kind of codiskcyclic operators satisfying the criterion has been characterized, the equivalence between them has been discussed and the class of codiskcyclic operators satisfying their direct summand is codiskcyclic. Finally, this kind of operators is used to prove that every codiskcyclic operator satisfies the criterion if the general kernel is dense in the space.

View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref