Preferred Language
Articles
/
joe-328
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffic load parameter μ for each parent node and then use in the EWPBRC algorithm to estimate the transmission rate of parent nodes and then assign a suitable transmission rate for each child node. A comparative study between (MSNTLP with EWBPRC) and fuzzy logic controller for traffic load parameter with Exponential Weight of Priority Based Rate Control algorithm (FTLP with EWBPRC) algorithm shows that the (MSNTLP with EWBPRC) is more efficient than (FTLP with EWBPRC) algorithm in terms of packet loss, queue delay and throughput. Another comparative study between (MSNTLP with EWBPRC) and EWBPRC with fixed traffic load parameter (µ) shows that the MSNTLP with EWBPRC is more efficient than EWBPRC with fixed traffic load parameter (µ) in terms of packet loss ratio and queue delay. A simulation process is developed and tested using the network simulator _2 (NS2) in a computer having the following properties: windows 7 (64-bit), core i7, RAM 8GB, hard 1TB.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 15 2023
Journal Name
Journal Of Robotics
A New Proposed Hybrid Learning Approach with Features for Extraction of Image Classification
...Show More Authors

Image classification is the process of finding common features in images from various classes and applying them to categorize and label them. The main problem of the image classification process is the abundance of images, the high complexity of the data, and the shortage of labeled data, presenting the key obstacles in image classification. The cornerstone of image classification is evaluating the convolutional features retrieved from deep learning models and training them with machine learning classifiers. This study proposes a new approach of “hybrid learning” by combining deep learning with machine learning for image classification based on convolutional feature extraction using the VGG-16 deep learning model and seven class

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
D.C conductivity of In2O3: SnO2 thin films and manufacturing of gas sensor
...Show More Authors

Compounds were prepared from In2O3 doped SnO2 with different doping ratio by mixing and sintering at 1000oC. Pulsed Laser Deposition PLD was used to deposit thin films of different doping ratio In2O3: SnO2 (0, 1, 3, 5, 7 and 9 % wt.) on glass and p-type wafer Si(111) substrates at ambient temperature under vacuum of 10-3 bar thickness of ~100nm. X-ray diffraction and atomic force microscopy were used to examine the structural type, grain size and morphology of the prepared thin films. The results show the structures of thin films was also polycrystalline, and the predominate peaks are identical with standard cards ITO. On the other side the prepared thin films declared a reduction of degree of crystallinity with the increase of doping ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
Preservation of Required Chlorine Concentration in Baghdad Water Supply Networks using On-Site Chlorine Injection
...Show More Authors

The chlorine concentration variation in Baghdad water networks was studied. The
chlorine data were collected from Mayoralty of Baghdad and Ministry of Environment
(MOE) for the networks for both sides of the city Karkh and Rasafa for (2008-2009). The
study of these data indicates that there are no systematic testing program .Classified GIS
maps showed that the areas far from the treatment plants have almost always low
chlorine concentration .This indicates that the problem of the low chlorine concentration
in the far areas is due to cracks of pipe along the conveyance path ,as expected. The area's
most frequently have low concentration are Al-sadir,Al-Kadhimya, and Al-Amiria . It
was found also that the chlorine c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Biodegradation Studies in Vitro of Novel Poly(adipic anhydride-co-mannitol)-N-maleoyl Chitosan Networks
...Show More Authors

In this work, novel copolymers of poly(adipic anhydride-co-mannitol) were synthesized by melting condensation polymerization of poly(adipic anhydride) with five percentages of mannitol sugar, 1 to 5 Wt.%. These copolymers were purified and then, characterized by FT-IR, which was proved that the cross-linking reaction was caused by nucleophilic attack of mannitol hydroxyl group to acidic anhydride groups of poly(adipic anhydride) backbone and new ester groups were formed and appeared. Also, modified organic-soluble chitosan, N-maleoyl-chitosan, were synthesized by grafting reaction of chitosan with maleic anhydride in DMF as solvent, and it was also purified and characterized by FT-IR. Biodegradation in vitro of the IPNs of poly(adipic anhyd

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Iron (II) Determination in Lipstick Samples using Spectrophotometric and Microfluidic Paper-based Analytical Device (µPADs) Platform via Complexation Reaction with Iron Chelator 1, 10-phenanthroline: A Comparative Study
...Show More Authors

This study was undertaken to introduce a fast, accurate, selective, simple and environment-friendly colorimetric method to determine iron (II) concentration in different lipstick brands imported or manufactured locally in Baghdad, Iraq. The samples were collected from 500-Iraqi dinars stores to establish routine tests using the spectrophotometric method and compared with a new microfluidic paper-based analytical device (µPAD) platform as an alternative to cost-effective conventional instrumentation such as Atomic Absorption Spectroscopy (AAS). This method depends on the reaction between iron (II) with iron(II) selective chelator 1, 10-phenanthroline(phen) in the presence of reducing agent hydroxylamine (HOA) and sodium acetate (NaOAc) b

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jul 24 2018
Journal Name
Sensors
Adaptive Windowing Framework for Surface Electromyogram-Based Pattern Recognition System for Transradial Amputees
...Show More Authors

Electromyogram (EMG)-based Pattern Recognition (PR) systems for upper-limb prosthesis control provide promising ways to enable an intuitive control of the prostheses with multiple degrees of freedom and fast reaction times. However, the lack of robustness of the PR systems may limit their usability. In this paper, a novel adaptive time windowing framework is proposed to enhance the performance of the PR systems by focusing on their windowing and classification steps. The proposed framework estimates the output probabilities of each class and outputs a movement only if a decision with a probability above a certain threshold is achieved. Otherwise (i.e., all probability values are below the threshold), the window size of the EMG signa

... Show More
View Publication
Crossref (25)
Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
A Crime Data Analysis of Prediction Based on Classification Approaches
...Show More Authors

Crime is considered as an unlawful activity of all kinds and it is punished by law. Crimes have an impact on a society's quality of life and economic development. With a large rise in crime globally, there is a necessity to analyze crime data to bring down the rate of crime. This encourages the police and people to occupy the required measures and more effectively restricting the crimes. The purpose of this research is to develop predictive models that can aid in crime pattern analysis and thus support the Boston department's crime prevention efforts. The geographical location factor has been adopted in our model, and this is due to its being an influential factor in several situations, whether it is traveling to a specific area or livin

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref