Preferred Language
Articles
/
joe-442
Data Aggregation in Wireless Sensor Networks Using Modified Voronoi Fuzzy Clustering Algorithm
...Show More Authors

Data centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which lead to extend the network lifetime and reduce the traffic that may be accrue in the buffer of sink node. Each cluster head collected data from its members and forwards it to the sink node. A comparative study between modified VFCA and LEACH protocol is implemented in this paper and shows that the modified VFCA is more efficient than LEACH protocol in terms of network lifetime and average energy consumption. Another comparative study between modified VFCA and K-Means clustering algorithm is presented and shows that the modified VFCA is more efficient than K-Means clustering algorithm in terms of  packets transmitted to sink node, buffer utilization, packet loss values and running time. A simulation process is developed and tested using Matlab R2010a program in a computer having the following properties: windows 7 (32-bit operating system), core i7, RAM 4GB, hard 1TB.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Effective Digital Image Colors Reduction/Quantization Method
...Show More Authors

In the current research work, a method to reduce the color levels of the pixels within digital images was proposed. The recent strategy was based on self organization map neural network method (SOM). The efficiency of recent method was compared with the well known logarithmic methods like Floyd-Steinberg (Halftone) dithering and Octtrees (Quadtrees) methods. Experimental results have shown that by adjusting the sampling factor can produce higher-quality images with no much longer run times, or some better quality with shorter running times than existing methods. This observation refutes the repeated neural networks is necessarily slow but have best results. The generated quantization map can be exploited for color image compression, clas

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 28 2020
Journal Name
Iraqi Journal Of Science
A Review of Software Watermarking
...Show More Authors

The Internet is the hallmark of the age of technology and this technology is complemented by the presence of software which is one of the basic components of the operation of the network and it is used in almost all daily life aspects such as industry, commerce and others. Because the digital documents and objects can be easily replicated and distributed at an economically low cost and as the software is a type of digital object, the problem of software watermarking risen as related to how to protect data from piracy. Therefore, various techniques have been developed to protect codes from misusing and unauthorized alteration. Each of them is known as watermarking technology that protects data by inserting secret information into software

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Iraqi Journal Of Science
Arabic Handwriting Word Recognition Based on Scale Invariant Feature Transform and Support Vector Machine
...Show More Authors

Offline Arabic handwritten recognition lies in a major field of challenge due to the changing styles of writing from one individual to another. It is difficult to recognize the Arabic handwritten because of the same appearance of the different characters.  In this paper a proposed method for Offline Arabic handwritten recognition. The   proposed method for recognition hand-written Arabic word without segmentation to sub letters based on feature extraction scale invariant feature transform (SIFT) and   support vector machines (SVMs) to enhance the recognition accuracy. The proposed method  experimented using (AHDB) database. The experiment result  show  (99.08) recognition  rate.

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 02 2023
Journal Name
Journal Of Engineering
Performance Assessment of Pile Models Chemically Grouted by Low-Pressure Injection Laboratory Device for Improving Loose Sand
...Show More Authors

The complexity and partially defined nature of jet grouting make it hard to predict the performance of grouted piles. So the trials of cement injection at a location with similar soil properties as the erecting site are necessary to assess the performance of the grouted piles. Nevertheless, instead of executing trial-injected piles at the pilot site, which wastes money, time, and effort, the laboratory cement injection devices are essential alternatives for evaluating soil injection ability. This study assesses the performance of a low-pressure laboratory grouting device by improving loose sandy soil injected using binders formed of Silica Fume (SF) as a chemical admixture (10% of Ordinary Portland Cement OPC mass) to di

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Role of IL-37 and Dectin-1 during Toxoplasmosis
...Show More Authors

Toxoplasmosis is a parasitic infection that triggers immune cells to produce cytokines and inflammatory mediators that are responsible for abnormal or aborted immune responses. This study highlights the evaluation of the Dectin-1 receptor and cytokine IL-37 in the serum of 80 patients who had miscarried in the first trimester and were infected with toxoplasmosis, as well as 40 pregnant women in the first trimester who had a successful pregnancy (control groups). The serum was first screened for the T. gondii IgM and IgG antibodies by an enzyme-linked immunosorbent assay (ELISA) and then the serum levels of IL-37 and Dectin-1 were determined. The results showed that the serum level of Dectin-1 was significantly increased in anti-

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
On Closed Rickart Modules
...Show More Authors

In this article, we study the notion of closed Rickart modules. A right R-module M is said to be closed Rickart if, for each , is a closed submodule of M. Closed Rickart modules is a proper generalization of Rickart modules. Many properties of closed Rickart modules are investigated. Also, we provide some characterizations of closed Rickart modules. A necessary and sufficient condition is provided to ensure that this property is preserved under direct sums. Several connections between closed Rickart modules and other classes of modules are given. It is shown that every closed Rickart module is -nonsingular module. Examples which delineate this concept and some results are provided.

View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Design and Construction of Ultraviolet and Incoming Solar Irradiance Sensing Device
...Show More Authors

     In-situ measurements of ultraviolet (UV) and solar irradiance is very sparse in Nigeria because of cost; it is  estimated using meteorological parameters. In this work, a low-cost UV and pyranometer device, using locally sourced materials, was developed. The instrument consists of a UV sensor (ML8511), a photodiode (BPW34) housed in a carefully sealed vacuumed glass bulb, the UV and solar irradiance sensor amplifiers, a 16-bit analog-to-digital converter (ADS1115), Arduino mega 2560, liquid crystal display (LCD) and microSD card for data logging. The designed amplifier has an offset voltage of 0.8676 mV. The sensitivity of the irradiance device is 86.819 Wm-2/mV with a correcting factor of 27.77 Wm-2 and a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Magnetic Deflection Coefficient Investigation for Low Energy Particles
...Show More Authors

In this research we solved numerically Boltzmann transport equation in order to calculate the transport parameters, such as, drift velocity, W, D/? (ratio of diffusion coefficient to the mobility) and momentum transfer collision frequency ?m, for purpose of determination of magnetic drift velocity WM and magnetic deflection coefficient ? for low energy electrons, that moves in the electric field E, crossed with magnetic field B, i.e; E×B, in the nitrogen, Argon, Helium and it's gases mixtures as a function of: E/N (ratio of electric field strength to the number density of gas), E/P300 (ratio of electric field strength to the gas pressure) and D/? which covered a different ranges for E/P300 at temperatures 300°k (Kelvin). The results show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF