Preferred Language
Articles
/
joe-328
A Spike Neural Controller for Traffic Load Parameter with Priority-Based Rate in Wireless Multimedia Sensor Networks
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to   produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffic load parameter μ for each parent node and then use in the EWPBRC algorithm to estimate the transmission rate of parent nodes and then assign a suitable transmission rate for each child node. A comparative study between (MSNTLP with EWBPRC) and fuzzy logic controller for traffic load parameter with Exponential Weight of Priority Based Rate Control algorithm (FTLP with EWBPRC) algorithm shows that the (MSNTLP with EWBPRC) is more efficient than (FTLP with EWBPRC) algorithm in terms of packet loss, queue delay and throughput. Another comparative study between (MSNTLP with EWBPRC) and EWBPRC with fixed traffic load parameter (µ) shows that the MSNTLP with EWBPRC is more efficient than EWBPRC with fixed traffic load parameter (µ) in terms of packet loss ratio and queue delay. A simulation process is developed and tested using the network simulator _2 (NS2) in a computer having the following properties: windows 7 (64-bit), core i7, RAM 8GB, hard 1TB.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
Comparative analysis of parameter estimation methods for Meixner process using wavelet packet transform
...Show More Authors

The current research creates an overall relative analysis concerning the estimation of Meixner process parameters via the wavelet packet transform. Of noteworthy presentation relevance, it compares the moment method and the wavelet packet estimator for the four parameters of the Meixner process. In this paper, the research focuses on finding the best threshold value using the square root log and modified square root log methods with the wavelet packets in the presence of noise to enhance the efficiency and effectiveness of the denoising process for the financial asset market signal. In this regard, a simulation study compares the performance of moment estimation and wavelet packets for different sample sizes. The results show that wavelet p

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Bayes and Non-Bayes Estimation Methods for the Parameter of Maxwell-Boltzmann Distribution
...Show More Authors

In this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2014
Journal Name
American Journal Of Mathematics And Statistics
Preliminary Test Single Stage Shrinkage Estimator for the Scale Parameter of Gamma Distribution
...Show More Authors

Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
Electrical glow discharges and plasma parameter of planar sputtering system for silver target
...Show More Authors

DC planar sputtering system is characterized by varying discharge potential of (250-2000 volt) and Argon gas pressures of (3.5×10-2 – 1.5) mbar. The breakdown voltage for silver electrode was studied with a uniform electric field at different discharge distances, as well as plasma parameters. The breakdown voltage is a product of the Argon gas pressure inside the chamber and gab distance between the electrodes, represent as Paschen curve. The Current-voltage characteristics curves indicate that the electrical discharge plasma is working in the abnormal glow region. Plasma parameters were found from the current-voltage characteristics of a single probe positioned at the inter-cathode space. Typical values of the electron temperature an

... Show More
View Publication Preview PDF
Crossref