Preferred Language
Articles
/
ijs-5767
Solving Adaptive Distributed Routing Algorithm Using Crow Search Algorithm
...Show More Authors

    Crow Search Algorithm (CSA) can be defined as one of the new swarm intelligence algorithms that has been developed lately, simulating the behavior of a crow in a storage place and the retrieval of the additional food when required. In the theory of the optimization, a crow represents a searcher, the surrounding environment represents the search space, and the random storage of food location represents a feasible solution. Amongst all the food locations, the one where the maximum amount of the food is stored is considered as the global optimum solution, and objective function represents the food amount. Through the simulation of crows’ intelligent behavior, the CSA attempts to find the optimum solutions to a variety of the problems that are related to the optimization. This study presents a new adaptive distributed algorithm of routing on CSA. Because the search space may be modified according to the size and kind of the network, the algorithm can be easily customized to the issue space. In contrast to population-based algorithms that have a broad and time-consuming search space. For ten networks of various sizes, the technique was used to solve the shortest path issue. And its capability for solving the problem of the routing in the switched networks is examined: detecting the shortest path in the process of a data packet transfer amongst the networks. The suggested method was compared with four common metaheuristic algorithms (which are: ACO, AHA, PSO and GA) on 10 datasets (integer, weighted, and not negative graphs) with a variety of the node sizes (10 - 297 nodes). The results have proven that the efficiency of the suggested methods is promising as well as competing with other approaches.

Scopus Crossref
View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Compression of an ECG Signal Using Mixed Transforms
...Show More Authors

Electrocardiogram (ECG) is an important physiological signal for cardiac disease diagnosis. With the increasing use of modern electrocardiogram monitoring devices that generate vast amount of data requiring huge storage capacity. In order to decrease storage costs or make ECG signals suitable and ready for transmission through common communication channels, the ECG data
volume must be reduced. So an effective data compression method is required. This paper presents an efficient technique for the compression of ECG signals. In this technique, different transforms have been used to compress the ECG signals. At first, a 1-D ECG data was segmented and aligned to a 2-D data array, then 2-D mixed transform was implemented to compress the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
Exploration of A Cemetery Using Ground Penetration Radar
...Show More Authors

     Ground penetrating radar (GPR) technology is used to determine the extent to which this technique can detect with a high-frequency range from 10 MHz to 1000 MHz into the ground by a transmitting antenna and A graveyard was found beneath the depth of the three meters under Surface of the earth in the shrine of the Prophet Houd and Saleh in Al-Najaf Governorate surveyed by through 4 tracks. Ground Penetrating Radar (GPR) is a device that transmits short pulses of electromagnetic energy with pulse duration about 1 ns to 20 ns. applying the filter Time- Zero to the same profile at a depth (3m) , Two types of antennas were used in this study, with two different frequencies antennas (250, 500 )MHz Three tracks (23,25,2

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Reverse Engineering Representation Using an Image Processing Modification
...Show More Authors

In the reverse engineering approach, a massive amount of point data is gathered together during data acquisition and this leads to larger file sizes and longer information data handling time. In addition, fitting of surfaces of these data point is time-consuming and demands particular skills. In the present work a method for getting the control points of any profile has been presented. Where, many process for an image modification was explained using Solid Work program, and a parametric equation of the profile that proposed has been derived using Bezier technique with the control points that adopted. Finally, the proposed profile was machined using 3-aixs CNC milling machine and a compression in dimensions process has been occurred betwe

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Determination of bacterial contamination of milk using fluorometry
...Show More Authors

The aim of this paper is to determine the feasibility of using fluorometric methods as an indicator for quality and contamination of milk with E.coli bacteria, and selection the suitable wavelength to be used with laser induced auto fluorescence. Three groups of milk samples were used in this study: Fresh pasteurized milk samples, milk samples containing different concentration of E.coli bacteria which were added artificially, and milk samples that were kept in refrigerator for 3-5 days. Thirteen excitation wavelengths were used to get the emission spectra for all milk samples using spectroflourometer .The results showed that the emission spectra at 275nm excitation wavelength gave a good differentiation between these three groups.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
A Load Balancing Scheme for a Server Cluster Using History Results
...Show More Authors

Load balancing in computer networks is one of the most subjects that has got researcher's attention in the last decade. Load balancing will lead to reduce processing time and memory usage that are the most two concerns of the network companies in now days, and they are the most two factors that determine if the approach is worthy applicable or not. There are two kinds of load balancing, distributing jobs among other servers before processing starts and stays at that server to the end of the process is called static load balancing, and moving jobs during processing is called dynamic load balancing. In this research, two algorithms are designed and implemented, the History Usage (HU) algorithm that statically balances the load of a Loaded

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Craniofacial Surgery
Single Session Facial Lipostructure by Using Autologous Fat Mixed With Platelet-Rich Fibrin Injected by Using Facial Autologous Muscular Injection Technique
...Show More Authors
Aim:

This study was designed to evaluate the role of single session autologous facial fat grafting in correcting facial asymmetries after mixing it with platelet-rich fibrin (PRF) and injecting them into rich vascular facial muscular plane.

Materials and Methods:

Fifteen patients (12 females and 3 males) with age ranging from 18 years to 40 years were included in this study and followed up during 6 months, all the patients were treated in the Al-Shaheed Ghazi Al-Hariri for specialized surgeries hospital (Medical City, Baghdad, Iraq).

Auto

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Travelling Salesman Principle to Evaluate the Minimum Total Cost of the Iraqi Cities
...Show More Authors

The traveling salesman problem (TSP) is a well-known and important combinatorial optimization problem. The goal is to find the shortest tour that visits each city in a given list exactly once and then returns to the starting city. In this paper we exploit the TSP to evaluate the minimum total cost (distance or time) for Iraqi cities. So two main methods are investigated to solve this problem; these methods are; Dynamic Programming (DP) and Branch and Bound Technique (BABT). For the BABT, more than one lower and upper bounds are be derived to gain the best one. The results of BABT are completely identical to DP, with less time for number of cities (n), 5 ≤ n ≤ 25. These results proof the efficiency of BABT compared with so

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Sat Aug 22 2020
Journal Name
Multicultural Education
Effect Of Using Webinar Technique On The Digital Culture Of Chemistry Students In Ibin Haitham Pure Science College
...Show More Authors

The aim of this research is to identify the effect of Webinar technique on digital culture in the College of Education for pure sciences at Ibin Haitham, University of Baghdad. The research samples consisted of (68) male and female students from the Chemistry Department who are following classes during the (2019- 2020) academic year. The samples represent (42%) of the total number of (162) students split into control and experimental groups. For this purpose, the scientific contents for testing were determined. The experimental part is based on analysis of the results from experiments in (preliminary standard solutions, refractive index, Beer-Lambert law). To achieve the aim of the research in testing the measure of student's digital cultur

... Show More
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).

... Show More
View Publication Preview PDF
Crossref (1)
Crossref