Preferred Language
Articles
/
ijs-9961
Low Energy Consumption Scheme Based on PEGASIS Protocol in WSNs
...Show More Authors

Wireless Sensor Networks (WSNs) are composed of a collection of rechargeable sensor nodes. Typically, sensor nodes collect and deliver the necessary data in response to a user’s specific request in many application areas such as health, military and domestic purposes. Applying routing protocols for sensor nodes can prolong the lifetime of the network. Power Efficient GAthering in Sensor Information System (PEGASIS) protocol is developed as a chain based protocol that uses a greedy algorithm in selecting one of the nodes as a head node to transmit the data to the base station. The proposed scheme Multi-cluster Power Efficient GAthering in Sensor Information System (MPEGASIS) is developed based on PEGASIS routing protocol in WSN. The aim of the proposed scheme is to introduce a transmission power control system based on the residual energy level and the energy harvesting status of each sensor node to extend the overall lifetime of WSN and to balance the energy usage, this leads to increasing network lifetime and decreasing energy consumption. MPEGASIS outperforms PEGASIS protocol by about 19%, and LEACH protocol by about 34%. For the sake of performance evaluation, MPEGASIS protocol besides PEGASIS and LEACH protocols are simulated and compared using Network Simulator (NS2).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Multicomponent Inverse Lomax Stress-Strength Reliability
...Show More Authors

In this article we derive two reliability mathematical expressions of two kinds of s-out of -k stress-strength model systems; and . Both stress and strength are assumed to have an Inverse Lomax distribution with unknown shape parameters and a common known scale parameter. The increase and decrease in the real values of the two reliabilities are studied according to the increase and decrease in the distribution parameters. Two estimation methods are used to estimate the distribution parameters and the reliabilities, which are Maximum Likelihood and Regression. A comparison is made between the estimators based on a simulation study by the mean squared error criteria, which revealed that the maximum likelihood estimator works the best.

View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Jan 03 2023
Journal Name
College Of Islamic Sciences
Jurisprudence of the narratives Jurisprudence of the narratives of Mother of the Believers “Um Salmah: (may God bless her) agreed upon between Bukhari and Muslm in respect to fasting, Hajj” pilgrimage” and Sharia duration : The life of the mother of the believers, Umm Salamah, the jurisprudence of the narratives of Umm Salamah, agreed upon between Bukhari and Muslim
...Show More Authors

Abstract

This research’s goal is to  restore and to revive the jurisprudence of  Mother of Believers (Um alMuaamineen) “Um Salmah” "may God bless her", and to highlight her outstanding assimilation and understanding of religion and her conscious thought.  The current research is a comparative scientific theoretical study  represented in the comparison of  jurisprudence of “Um Salamah” with Hadiths  of  fasting  and pilgrimage rules as well as the duration  mentioned in jurisprudence  of  for doctrines( 4 schools of thought )to identify these hadiths with the inclusion and discussion of their evidence.

The current research included two topics: the first one is to identify and introduce

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 25 2022
Journal Name
Knowledge And Information Systems
Unsupervised model for aspect categorization and implicit aspect extraction
...Show More Authors

People’s ability to quickly convey their thoughts, or opinions, on various services or items has improved as Web 2.0 has evolved. This is to look at the public perceptions expressed in the reviews. Aspect-based sentiment analysis (ABSA) deemed to receive a set of texts (e.g., product reviews or online reviews) and identify the opinion-target (aspect) within each review. Contemporary aspect-based sentiment analysis systems, like the aspect categorization, rely predominantly on lexicon-based, or manually labelled seeds that is being incorporated into the topic models. And using either handcrafted rules or pre-labelled clues for performing implicit aspect detection. These constraints are restricted to a particular domain or language which is

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
An Integrated Information Gain with A Black Hole Algorithm for Feature Selection: A Case Study of E-mail Spam Filtering
...Show More Authors

     The current issues in spam email detection systems are directly related to spam email classification's low accuracy and feature selection's high dimensionality. However, in machine learning (ML), feature selection (FS) as a global optimization strategy reduces data redundancy and produces a collection of precise and acceptable outcomes. A black hole algorithm-based FS algorithm is suggested in this paper for reducing the dimensionality of features and improving the accuracy of spam email classification. Each star's features are represented in binary form, with the features being transformed to binary using a sigmoid function. The proposed Binary Black Hole Algorithm (BBH) searches the feature space for the best feature subsets,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Performance Evaluation and Comparison Between LDPC and Turbo Coded MC-CDMA
...Show More Authors

This work presents a comparison between the Convolutional Encoding CE, Parallel Turbo code and Low density Parity Check (LDPC) coding schemes with a MultiUser Single Output MUSO Multi-Carrier Code Division Multiple Access (MC-CDMA) system over multipath fading channels. The decoding technique used in the simulation was iterative decoding since it gives maximum efficiency at higher iterations. Modulation schemes used is Quadrature Amplitude Modulation QAM. An 8 pilot carrier were
used to compensate channel effect with Least Square Estimation method. The channel model used is Long Term Evolution (LTE) channel with Technical Specification TS 25.101v2.10 and 5 MHz bandwidth bandwidth including the channels of indoor to outdoor/ pedestrian

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Iraqi Journal Of Science
Comparison Different Estimation Methods for the Parameters of Non-Linear Regression
...Show More Authors

   Nonlinear regression models are important tools for solving optimization problems. As traditional techniques would fail to reach satisfactory solutions for the parameter estimation problem.  Hence, in this paper, the BAT algorithm  to estimate the parameters of  Nonlinear Regression models is used . The simulation study is considered to investigate the performance of the proposed algorithm with the maximum likelihood (MLE) and Least square (LS) methods. The results show that the Bat algorithm provides accurate estimation and it is satisfactory for the parameter estimation of the nonlinear regression models than MLE and LS methods depend on Mean Square error.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Design and Simulation of Closed Loop Proportional Integral (PI) Controlled Boost Converter and 3-phase Inverter for Photovoltaic (PV) Applications
...Show More Authors

This research deals with the design and simulation of a solar power system consisting of a KC200GT solar panel, a closed loop boost converter and a three phase inverter by using Matlab / Simulink. The mathematical equations of the solar panel design are presented. The electrical characteristics of the panel are tested at the values ​​of 1000  for light radiation and 25 °C for temperature environment. The Proportional Integral (PI) controller is connected   as feedback with the Boost converter to obtain a stable output voltage by reducing the oscillations in the voltage to charge a battery connected to the output of the converter. Two methods (Particle Swarm Optimization (PSO) and Zeigler- Nichols) are used for tuning

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Jan 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A parallel Numerical Algorithm For Solving Some Fractional Integral Equations
...Show More Authors

In this study, He's parallel numerical algorithm by neural network is applied to type of integration of fractional equations is Abel’s integral equations of the 1st and 2nd kinds. Using a Levenberge – Marquaradt training algorithm as a tool to train the network. To show the efficiency of the method, some type of Abel’s integral equations is solved as numerical examples. Numerical results show that the new method is very efficient problems with high accuracy.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 08 2023
Journal Name
Iraqi Journal Of Science
Video Image Compression Using Absolute Moment Block Truncation Method with Orthogonal Search Motion Estimation Technique
...Show More Authors

Image compression has become one of the most important applications of the image processing field because of the rapid growth in computer power. The corresponding growth in the multimedia market, and the advent of the World Wide Web, which makes the internet easily accessible for everyone. Since the early 1980, digital image sequence processing has been an attractive research area because an image sequence, as acollection of images, may provide much compression than a single image frame. The increased computational complexity and memory space required for image sequence processing, has in fact, becoming more attainable. this research absolute Moment Block Truncation compression technique which is depend on adopting the good points of oth

... Show More
View Publication Preview PDF