Preferred Language
Articles
/
ijs-7622
Multi-layer Multi-objective Evolutionary Algorithm for Adjustable Range Set Covers Problem in Wireless Sensor Networks
...Show More Authors

Establishing complete and reliable coverage for a long time-span is a crucial issue in densely surveillance wireless sensor networks (WSNs). Many scheduling algorithms have been proposed to model the problem as a maximum disjoint set covers (DSC) problem. The goal of DSC based algorithms is to schedule sensors into several disjoint subsets. One subset is assigned to be active, whereas, all remaining subsets are set to sleep. An extension to the maximum disjoint set covers problem has also been addressed in literature to allow for more advance sensors to adjust their sensing range. The problem, then, is extended to finding maximum number of overlapped set covers. Unlike all related works which concern with the disc sensing model, the contribution of this paper is to reformulate the maximum overlapped set covers problem to handle the probabilistic sensing model. The problem is addressed as a multi-objective optimization (MOO) problem and the well-known decomposition based multi-objective evolutionary algorithm (MOEA/D) is adopted to solve the stated problem. A Multi-layer MOEA/D is suggested, wherein each layer yields a distinct set cover. Performance evaluations in terms of total number of set covers, total residual energy, and coverage reliability are reported through extensive simulations. The main aspect of the results reveals that the network's lifetime (i.e. total number of set covers) can be extended by increasing number of sensors. On the other hand, the coverage reliability can be increased by increasing sensing ranges but at the expense of decreasing the network's lifetime.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 18 2023
Journal Name
Journal Of Iraqi Al-khwarizmi
Fibrewise Multi-Compact and Locally Multi- Compact Spaces
...Show More Authors

The primary objective of this paper is to introduce a new concept of fibrewise topological spaces on D is named fibrewise multi- topological spaces on D. Also, we entroduce the concepts of multi-proper, fibrewise multi-compact, fibrewise locally multi-compact spaces, Moreover, we study relationships between fibrewise multi-compact (resp., locally multi-compac) space and some fibrewise multi-separation axioms.

Preview PDF
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving the Multi-criteria, Total Completion Time, Total Earliness Time, and Maximum Tardiness Problem
...Show More Authors

Machine scheduling problems (MSP) are     considered as one of the most important classes of combinatorial optimization problems. In this paper, the problem of job scheduling on a single machine is studied to minimize the multiobjective and multiobjective objective function. This objective function is: total completion time, total lead time and maximum tardiness time, respectively, which are formulated as  are formulated. In this study, a mathematical model is created to solve the research problem. This problem can be divided into several sub-problems and simple algorithms have been found to find the solutions to these sub-problems and compare them with efficient solutions. For this problem, some rules that provide efficient solutio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 05 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval

Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Real-time control for the transmission of information in wireless networks
...Show More Authors

Wireless  lietworking is·  constantly improving,  changing  and

though  ba ic  principle  is the same.  ['nstead of  using standard  cables  to transmit information fmm one point to another (qr more), it .uses  radio signals.  This paper  presents .a case  study considedng real-time remote

cqntroJ using Wireless UDP/JP-based networks,. The aim of-this werk is to

reduce  real-time· remote control  system  based upon a simulatio.n  model,

which can operate via general communication  l"]etworks, whieh on bodies. modern wireles  tcchnolqgy.

The  first  part includes· a  brief

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
International Journal Of Computer Networks And Wireless Communications
Performance Analysis of VoIP in Wireless Networks
...Show More Authors

Voice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator

... Show More
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Copy Move Image Forgery Detection using Multi-Level Local Binary Pattern Algorithm
...Show More Authors

Digital image manipulation has become increasingly prevalent due to the widespread availability of sophisticated image editing tools. In copy-move forgery, a portion of an image is copied and pasted into another area within the same image. The proposed methodology begins with extracting the image's Local Binary Pattern (LBP) algorithm features. Two main statistical functions, Stander Deviation (STD) and Angler Second Moment (ASM), are computed for each LBP feature, capturing additional statistical information about the local textures. Next, a multi-level LBP feature selection is applied to select the most relevant features. This process involves performing LBP computation at multiple scales or levels, capturing textures at different

... Show More
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Baghdad Science Journal
Spatiotemporal Modeling in Wireless Communication Networks
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Spatiotemporal Modeling in Wireless Communication Networks
...Show More Authors

This study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Security of Wireless Sensor Nodes
...Show More Authors

Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref