Preferred Language
Articles
/
joe-116
Robustness Assessment of Regional GNSS Geodetic Networks for Precise Applications
...Show More Authors

Over the past few decades, the surveying fieldworks were usually carried out based on classical positioning methods for establishing horizontal and vertical geodetic networks. However, these conventional positioning techniques have many drawbacks such as time-consuming, too costly, and require massive effort. Thus, the Global Navigation Satellite System (GNSS) has been invented to fulfill the quickness, increase the accuracy, and overcome all the difficulties inherent in almost every surveying fieldwork. This research assesses the accuracy of local geodetic networks using different Global Navigation Satellite System (GNSS) techniques, such as Static, Precise Point Positioning, Post Processing Kinematic, Session method, and finally Real Time Kinematic for different surveying applications. To achieve this assessment, GNSS observations were executed to highlight the characteristics for each GNSS observation technique. Furthermore, the level of accuracy which is gained from each positioning technique is enormously investigated to figure out the amount of allowable error and the suitability for different geodetic applications. In relative positioning, at least two receivers (or more) are required for timing and positioning while the Precise Point Positioning necessitates single receiver. Some of geodetic applications require about positions with centimeter level of accuracy or less. The robust geodetic networks provide accurate positions which in turn serve different earth science applications.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
An Improved Cuckoo Search Algorithm for Maximizing the Coverage Range of Wireless Sensor Networks
...Show More Authors

The issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks
...Show More Authors

Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Wireless Communications And Mobile Computing
Developing a Video Buffer Framework for Video Streaming in Cellular Networks
...Show More Authors

This work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video

... Show More
View Publication
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Analysis of Regional Development in Abu Ghraib Municipality within the Available Sources
...Show More Authors

The judgment enjoys many potential sources. If we look at these sources with analytical view that enable us to identify the potentials of strength in them which is the existence of features that distinct each place from the other one, which can be considered opportunities that provide the designer and the planner the possibility to design and planning which is based on subs taken from the reality of the available data of the location.
At this point outstands the role of development sources as one of the processes of re-configuring the place which appear as a result of a reality that requires setting new goals for the society and to achieve these goals it takes observations dealing with the place policies that should be taken, so this

... Show More
View Publication Preview PDF