Preferred Language
Articles
/
joe-774
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Al-Bayhaqi’s Preferred Opinions in his Book Al-Khilafiyat-Chapter of Breastfeeding: عذراء حميد فريح , وايمن عبد القادر الهيتي
...Show More Authors

This research is a comparative jurisprudential study that focuses on Imam Al-Bayhaqi’s preferred opinions in his book Al-Khilafiyat (The Disagreements), the part of Al-Rida’a (Breastfeeding). It is considered one of the most important familial topics that is concerned with organizing the social relations in Islam, strengthens the family ties and that prevents the family disintegration due to the ignorance and lack in comprehending Sharia laws (Islam law) in all aspects. The study follows the inductive and descriptive method. It aims at examining the prohibition of marriage when breastfeeding takes place at the time of woman’s conversion to Islam or during her infidelity period. It further aims at verifying the prohibition

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Evaluating Educational Programs in Combating Indecent Behaviors Among University Students Using Structural Equation Modeling (Field study: Northern Border University)
...Show More Authors

The study aimed to evaluate educational programs efficiency in applying the best educational practices to educate students from the dangers of indecent behaviors, in line with higher education policy and the appropriateness of educational program dimensions to spread awareness among students to not fall into the indecent behaviors clutches. The study adopted the inductive exploratory approach through structural equation modeling and the descriptive analysis of the collected data from randomly selected sample (n=385) from educational academics at Northern Border University in the Saudi Arabia using a specially designed survey tool to meet study purposes to evaluate dimensions of teaching methods, evaluation tools, training courses, course

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 02 2009
Journal Name
Albahith Alalami
Types, contents and scientific research methods used in public relations research at the College of Mass Communication 1989 - 2007.
...Show More Authors

This study deals with knowing the types of research in public relations studies at the Faculty of Mass Communication for the period from 1989 to 2007 and knowing the methods that researchers used in their studies, as well as knowing the methods and tools of scientific research that were used, and whether one method or tool is used more than others, and knowing Samples used in the analysis. As well as the contents and types of this research The institutions that were subjected to the study, and the preparation of the respondents This research aims to answer the following questions:. A- What are the types of research and methods that were used in university theses that dealt with the topic? Public Relations at the Faculty of Media from 1989

... Show More
Publication Date
Sat Dec 01 2018
Journal Name
Baghdad Science Journal
Seasonal variation and modeling of disinfection by-products (DBPs) in drinking water distribution systems of Wassit Province Southeast Iraq
...Show More Authors

Scopus (8)
Scopus
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Anticancer Activity of Chitosan Schiff Base / PVP Gold Nano Composite in Treating Esophageal Cancer Cell Line
...Show More Authors

In the present paper, chitosan Schiff base has been synthesized from chitosan’s reaction with the salicyldehyde. The AuNPs was manufacture by extract of onion peels as a reducing agent. The Au NPs that have been prepared were characterized through the UV-vis spectroscopy, XRD analyses and SEM microscopy. The polymer blends of the chitosan Schiff base / PVP has been prepared through using the approach of solution casting. Chitosan Schiff base / PVP Au nano-composites was prepared. Nano composites and polymer blends have been characterized by FTIR which confirm the formation of Schiff base by revealing a new band of absorption at 1651cm-1 as a result of the (C=N) imine group. SEM, DSC and TGA confirms the thermal stability of

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Asian Pacific Journal Of Cancer Prevention
Cytotoxic Activity of the Ethyl Acetate Extract of Iraqi Carica papaya Leaves in Breast and Lung Cancer Cell Lines
...Show More Authors

View Publication
Scopus (12)
Crossref (8)
Scopus Crossref
Publication Date
Fri Feb 14 2014
Journal Name
Journal Of Basic Microbiology
Isolation and characterization of lytic vibriophage against <i>Vibrio cholerae</i> O1 from environmental water samples in Kelantan, Malaysia
...Show More Authors

Water samples from a variety of sources in Kelantan, Malaysia (lakes, ponds, rivers, ditches, fish farms, and sewage) were screened for the presence of bacteriophages infecting Vibrio cholerae. Ten strains of V. cholerae that appeared to be free of inducible prophages were used as the host strains. Eleven bacteriophage isolates were obtained by plaque assay, three of which were lytic and further characterized. The morphologies of the three lytic phages were similar with each having an icosahedral head (ca. 50–60 nm in diameter), a neck, and a sheathed tail (ca. 90–100 nm in length) characteristic of the family Myoviridae.

... Show More
View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Effect of Chloride Ions on the Corrosion Behavior of Al – Zn Alloy in NaOH Solution at Four Different Temperatures
...Show More Authors

This research involves study effect of chloride ions in concentration range (0.01 – 0.50 mol.dm-3) on the corrosion behavior of Al-Zn alloy in basic media of 1x10-3 mol.dm-3 NaOH at pH=11 and four different temperatures in the range (298-313 K). Cathodic and anodic Tafel slopes (bc &ba) and transfer coefficients (αc & αa) were calculated and the results interprets according to the variation of the rate – determining steps. The results also indicate that the chloride ions are bonded chemically in the interface as an initial step of formation of different mixed oxohydroxy – and chloro complexes. Polarization resistance (Rp) is calculates

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 13 2022
Journal Name
International Journal Of Medical Sciences
Evaluation of the Levels of Erythropoietin and Some Haehematological Parameters in Patients with History of Haemodialysis and Non- haemodialysis
...Show More Authors

Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref