Preferred Language
Articles
/
ijs-7622
Multi-layer Multi-objective Evolutionary Algorithm for Adjustable Range Set Covers Problem in Wireless Sensor Networks
...Show More Authors

Establishing complete and reliable coverage for a long time-span is a crucial issue in densely surveillance wireless sensor networks (WSNs). Many scheduling algorithms have been proposed to model the problem as a maximum disjoint set covers (DSC) problem. The goal of DSC based algorithms is to schedule sensors into several disjoint subsets. One subset is assigned to be active, whereas, all remaining subsets are set to sleep. An extension to the maximum disjoint set covers problem has also been addressed in literature to allow for more advance sensors to adjust their sensing range. The problem, then, is extended to finding maximum number of overlapped set covers. Unlike all related works which concern with the disc sensing model, the contribution of this paper is to reformulate the maximum overlapped set covers problem to handle the probabilistic sensing model. The problem is addressed as a multi-objective optimization (MOO) problem and the well-known decomposition based multi-objective evolutionary algorithm (MOEA/D) is adopted to solve the stated problem. A Multi-layer MOEA/D is suggested, wherein each layer yields a distinct set cover. Performance evaluations in terms of total number of set covers, total residual energy, and coverage reliability are reported through extensive simulations. The main aspect of the results reveals that the network's lifetime (i.e. total number of set covers) can be extended by increasing number of sensors. On the other hand, the coverage reliability can be increased by increasing sensing ranges but at the expense of decreasing the network's lifetime.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Epidemiological Complex Networks: A Survey
...Show More Authors

     In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of soc

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Oct 12 2022
Journal Name
Axioms
Razy: A String Matching Algorithm for Automatic Analysis of Pathological Reports
...Show More Authors

Pathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Efficient Algorithm for Solving Fuzzy Singularly Perturbed Volterra Integro-Differential Equation
...Show More Authors

     In this paper, we design a fuzzy neural network to solve fuzzy singularly perturbed Volterra integro-differential equation by using a High Performance Training Algorithm such as the Levenberge-Marqaurdt (TrianLM) and the sigmoid function of the hidden units which is the hyperbolic tangent activation function. A fuzzy trial solution to fuzzy singularly perturbed Volterra integro-differential equation is written as a sum of two components. The first component meets the fuzzy requirements, however, it does not have any fuzzy adjustable parameters. The second component is a feed-forward fuzzy neural network with fuzzy adjustable parameters. The proposed method is compared with the analytical solutions. We find that the proposed meth

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Effect of Genetic Algorithm as a Feature Selection for Image Classification
...Show More Authors

     Analysis of image content is important in the classification of images, identification, retrieval, and recognition processes. The medical image datasets for content-based medical image retrieval (  are large datasets that are limited by high computational costs and poor performance. The aim of the proposed method is to enhance this image retrieval and classification by using a genetic algorithm (GA) to choose the reduced features and dimensionality. This process was created in three stages. In the first stage, two algorithms are applied to extract the important features; the first algorithm is the Contrast Enhancement method and the second is a Discrete Cosine Transform algorithm. In the next stage, we used datasets of the medi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
The effect of short range correlation on the inelastic C2 and C4 form factors of 18O nucleus
...Show More Authors

The effect of short range correlations on the inelastic Coulomb form factors for excited +2 states (1.982, 3.919, 5.250 and 8.210MeV) and +4 states (3.553, 7.114, 8.960 and 10.310 MeV) in O18 is analyzed. This effect (which depends on the correlation parameterβ) is inserted into the ground state charge density distribution through the Jastrow type correlation function. The single particle harmonic oscillator wave function is used with an oscillator size parameter .b The parameters β and b are adjusted for each excited state separately so as to reproduce the experimental root mean square charge radius of .18O The nucleusO18 is considered as an inert core of C12 with two protons and four neutrons distributed over 212521211sdp−− activ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Efficient Hybrid DCT-Wiener Algorithm Based Deep Learning Approach For Semantic Shape Segmentation
...Show More Authors

    Semantic segmentation is effective in numerous object classification tasks such as autonomous vehicles and scene understanding. With the advent in the deep learning domain, lots of efforts are seen in applying deep learning algorithms for semantic segmentation. Most of the algorithms gain the required accuracy while compromising on their storage and computational requirements. The work showcases the implementation of Convolutional Neural Network (CNN) using Discrete Cosine Transform (DCT), where DCT exhibit exceptional energy compaction properties. The proposed Adaptive Weight Wiener Filter (AWWF) rearranges the DCT coefficients by truncating the high frequency coefficients. AWWF-DCT model reinstate the convolutional l

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Ieee Access
SHE Networks: Security, Health, and Emergency Networks Traffic Priority Management Based on ML and SDN
...Show More Authors

Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat

... Show More
View Publication
Scopus (8)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Jun 11 2002
Journal Name
Iraqi Journal Of Laser
The Use of a Pulsed Nd: YAG Laser Radiation for the Removal of Intracanal Debris and Smear Layer in Extracted Human Teeth
...Show More Authors

The efficiency of Nd:YAG laser radiation in removing debris and smear layer from prepared root
canal walls was studied. Fifty-seven human extracted single rooted anterior teeth were divided into three
groups. A group that was not lased is considered as a control group. The remaining teeth were exposed to
different laser parameters regarding laser energy, repetition rate and exposure time. For the case of the set of
parameters of 7 mJ laser energy, the cleaning was maximum at 3 p.p.s. repetition rate for 3 seconds exposure
time for, the coronal, middle and apical thirds. Above and below this energy level, there was an overdose
(melting) or under dose (no effect). Nevertheless for 10mJ laser energy case, the cleaning effi

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Spe Europec Featured At 81st Eage Conference And Exhibition
Development of Artificial Neural Networks and Multiple Regression Analysis for Estimating of Formation Permeability
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref