Preferred Language
Articles
/
joe-194
Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network
...Show More Authors

Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one protocol to another depending on the applications used in the network. The network design is done using the program (Op-Net V14.5 modular) with core i7 computer for multiple nodes deployed randomly in several area (100 * 100, 200 * 200, 400 * 400, 800 * 800, 1000 * 1000)m2 accomplished by changing the number of nodes in the network (10, 20, 40 and 80). There are three programs designed using (MATLAB 2012A programming language). The first one evaluates the (QoS) using the organizational structure of the mysterious system (HFS), which relied on the standard applications that should be provided by the protocols to make the applications accepted by the nodes requirements. After the evaluation the QoS for all cases, we design Neural Network to assist in estimation of the best protocol for any network through QoS for all protocols (AODV, DSR, OLSR and TORA). Neural network has four entrances (area, number of nodes, real time application ratio and non-real time application ratio). The results show that the QoS estimated is (0.5401) of (OLSR) which has been improved to (0.6421) by reducing to mobility speed and making some nodes fixed and using more than one protocol in  the network to provide the best QoS .

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 13 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.: Isolation and Identification of food Probiotic Saccharomyces boulardii by using traditional methods, Vitek 2 system and molecular identification methods.
...Show More Authors

This study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 25 2019
Journal Name
Advances In Intelligent Systems And Computing
Solving Game Theory Problems Using Linear Programming and Genetic Algorithms
...Show More Authors

View Publication
Scopus (18)
Crossref (12)
Scopus Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Combined DWT and DCT Image Compression Using Sliding RLE Technique
...Show More Authors

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2012
Journal Name
2012 International Conference On Advanced Computer Science Applications And Technologies (acsat)
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estima

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2016
Journal Name
Journal Of Engineering
Numerical Investigation Using Harmonic and Transient Analysis To Rotor Dynamics
...Show More Authors

The rotor dynamics generally deals with vibration of rotating structures. For designing rotors of a high speeds, basically its important to take into account the rotor dynamics characteristics. The modeling features for rotor and bearings support flexibility are described in this paper, by taking these characteristics of rotor dynamics features into standard Finite Element Approach (FEA) model. Transient and harmonic analysis procedures have been found by ANSYS, the idea has been presented to deal with critical speed calculation. This papers shows how elements BEAM188 and COMBI214 are used to represent the shaft and bearings, the dynamic stiffness and damping coefficients of journal bearings as a matrices have been found

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 23 2021
Journal Name
International Journal Of Dentistry
Predicting Canine and Premolar Mesiodistal Crown Diameters Using Regression Equations
...Show More Authors

Objectives. The current study aimed to predict the combined mesiodistal crown widths of maxillary and mandibular canines and premolars from the combined mesiodistal crown widths of maxillary and mandibular incisors and first molars. Materials and Methods. This retrospective study utilized 120 dental models from Iraqi Arab young adult subjects with normal dental relationships. The mesiodistal crown widths of all teeth (except the second molars) were measured at the level of contact points using digital electronic calipers. The relation between the sum mesiodistal crown widths of the maxillary and mandibular incisors and first molars and the combined mesiodistal crown widths of the maxillary and mandibular canines and premolars was as

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More
Publication Date
Wed Aug 11 2021
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Image Denoising Using Multiwavelet Transform with Different Filters and Rules
...Show More Authors

<p class="0abstract">Image denoising is a technique for removing unwanted signals called the noise, which coupling with the original signal when transmitting them; to remove the noise from the original signal, many denoising methods are used. In this paper, the Multiwavelet Transform (MWT) is used to denoise the corrupted image by Choosing the HH coefficient for processing based on two different filters Tri-State Median filter and Switching Median filter. With each filter, various rules are used, such as Normal Shrink, Sure Shrink, Visu Shrink, and Bivariate Shrink. The proposed algorithm is applied Salt&amp; pepper noise with different levels for grayscale test images. The quality of the denoised image is evaluated by usi

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Generating pairwise combinatorial test set using artificial parameters and values
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref