Preferred Language
Articles
/
joe-2580
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and improving the routing protocol to support them makes it more suitable for IoT systems.
The proposed routing protocol is simulated using Castalia-3.2 and all the cases are examined to show the enhancement that achieved by each case. The proposed routing protocol shows better performance than other protocols do regarding Packet Delivery Ratio (PDR) and latency. It preserves network reliability since it does not generate routing or data packets needlessly. Routing protocol with added features (actuating and mobility) shows good performance. But that performance is affected by increasing the speed of mobile nodes.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Operation of the Iraqi Part of Al-Huweizah Marsh
...Show More Authors

Al-Huweizah Marsh is considered as the largest in Iraq. This research aims to maintain thesustainability of Al-Huweizah Marsh under all circumstances and within the limits of the
available natural resources from the Iraqi side and the absence of feeding from the Iranian sidedue to the recent Iranian separation dike along the international boundaries within the marsh.
Twelve scenarios have been suggested as a first step to restore the whole marsh. But the
uncontrolled Iranian feeders and exiguity of their discharges recently, it was necessary to studyonly the northern part of the marsh as an alternative case to ensure reasonable amounts of waterfor the purpose of maintaining and restore the marsh. Hydrological routing model was

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the path analysis method to diagnoseFactors influencing the intentions of the employees of the University of Dhi Qar To introduce Internet behavior
...Show More Authors

The purpose of this study is to diagnose factors that effect Thi-Qar behavioral intention to use internet. A sample of (127) internet users of university staff was taken in the study and were analyzed by using path analyze . The study concluded that there is a set of affecting correlation. It was founded that exogenous variables (gender, income, perceived fun, perceived usefulness, Image, and ease of use) has significant effect on endogenous (behavioral intention) . The result of analysis indicated that image hopeful gained users comes first, ease of use secondly, perceived fan and perceived usefulness on (dependent variables (daily internet usage and diversity of internet usage. Implication of these result are discussed . the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2023
Journal Name
Revue Académique De La Recherche Juridique
المسؤولية الجزائية لمزودي خدمة الإنترنت عن جريمة التنمر الإلكتروني.
...Show More Authors

يُعد التنمر ظاهرة إجتماعية قديمة موجودة في جميع المجتمعات سواء أكان المجتمع صناعيًا أم ناميًا، كما يُعد من المفاهيم الحديثة نسبيًا، وربما يرجع لحداثة الإعتراف به نوعًا من أنواع العنف فضلاعن ندرة الدراسات التي تناولته وعدم وجود معيار محدد لتحديد السلوك الذي يعد تنمرًا أم عابرًا، لقد بدأ الأهتمام بدراسة التنمر في سبعينات القرن الماضي وأصبح موضعًا يحضى بأهتمام العديد في مختلف البلدان، وفي عصرنا الحالي تطورت

... Show More
View Publication
Publication Date
Fri Aug 20 2021
Journal Name
Iraqi Journal Of Laser
The Influence of No-Core Fiber Length on the Sensitivity in Fiber Optic Strain Sensor
...Show More Authors

The influence of sensing element length of no-core fiber strain sensor has been studied and experimentally demonstrated, four different lengths of 125 μm diameter no-core fiber is fused between two standard single-mode fibers and bi-directionally strained, the highest obtained sensitivity was around 16.37 pm με -1 which was exhibited in the shortest no-core fiber segment, to the best of our knowledge this is the first study of the influence of no-core fiber strain sensors length on sensor sensitivity. The proposed sensor can be used in many opto-mechanical applications such as, structural health monitoring, aerospace vehicles and airplane components monitoring.

View Publication Preview PDF
Publication Date
Thu Apr 29 2021
Journal Name
Iraqi Journal Of Science
Capacitance and Resistivity Measurements of Polythiophene /Metallic Nanoparticles-based Humidity Sensors
...Show More Authors

Capacitive–resistive humidity sensors based on polythiophene (P3HT) organic semiconductor as an active material hybrid with three types of metallic nanoparticles (NP) (Ag, Al, and Cu) were synthesized by pulsed laser ablation (PLA). The hybrid P3HT/metallic nanoparticles were deposited on indium-tin-oxide (ITO) substrate at room temperature. The surface morphology of theses samples was studied by using field emission scanning electron micrographs (FE-SEM), which indicated the formation of nanoparticles with grain size of about 50nm. The electrical characteristics of the sensors were examined as a function of the relative humidity levels. The sensors showed an increase in the capacitance with variation in the humidity level.  Whil

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Enhancement of vanadium oxide doped Eu+3 for gas sensor application
...Show More Authors

Thin films of vanadium oxide nanoparticles doped with different concentrations of europium oxide (2, 4, 6, and 8) wt % are deposited on glass and Si substrates with orientation (111) utilizing by pulsed laser deposition technique using Nd:YAG laser that has a wavelength of 1064 nm, average frequency of 6 Hz and pulse duration of 10 ns. The films were annealed in air at 300 °C for two hours, then the structural, morphological and optical properties are characterized using x-ray diffraction (XRD), Field emission scanning electron microscopy (FESEM) and UV-Vis spectroscopy respectively. The X-ray diffraction results of V2O5:Eu2O3 exhibit that the film has apolycrystalline monoclinic V2O5 and triclinic V4O7 phases. The FESEM image shows a h

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 11 2019
Journal Name
Iraqi Journal Of Physics
Bulk heterojunction blend (NiPcTs:PEDOT:PSS) in gas sensing
...Show More Authors

Thin films of bulk heterojunction blend Ni-Phthalocyanine
Tetrasulfonic acid tetrasodium salt and dpoly
(3, 4-ethylenedioxythiophene) poly (styrenesulfonate) (NiPcTs:
PEDOT: PSS) with different (PEDOT:PSS) concentrations (0.5, 1, 2)
are prepared using spin coating technique with thickness 100 nm on
glass and Si substrate. The X-Ray diffraction pattern of NiPcTs
powder was studied and compared with NiPc powder, the pattern
showed that the structure is a polycrystalline with monoclinic phase.
XRD analysis of as-deposited (NiPcTs/PEDOT:PSS) thin films
blends in dicated that the film appeared at(100), (102) in
concentrations (0.5, 1) and (100) in concentration (2). The grain size
is increased with increasing

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 15 2026
Journal Name
Al–bahith Al–a'alami
FACTORS AFFECTING WOMEN’S USE OF ELECTRONIC MARKETING ON SOCIAL MEDIA : (Field Study)
...Show More Authors

The research aims to determine the factors affecting the woman’s use of electronic marketing in social networking sites, and to know the extent of the sample’s use of social networking sites for electronic shopping purposes. The research tool used the questionnaire form that was designed in its final form after presenting it to the arbitrators and it included a set of questions and a five-Likert scale, and used the spss statistical program to perform the statistical operations that were laid out in tables showing the frequencies, percentages and percentages Salary, mean, standard deviation, and correlation using the Spearman correlation coefficient, the Ka2 square test, the F test, the Alpha Cronbach test, and arrived at Searching to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 06 2021
Journal Name
Webology
The Role Of Digital Informatics In The Quality Of Scientific Research In In University Libraries: An Analytical Study Of Iraqi Libraries
...Show More Authors

View Publication