This paper describes the application of consensus optimization for Wireless Sensor Network (WSN) system. Consensus algorithm is usually conducted within a certain number of iterations for a given graph topology. Nevertheless, the best Number of Iterations (NOI) to reach consensus is varied in accordance with any change in number of nodes or other parameters of . graph topology. As a result, a time consuming trial and error procedure will necessary be applied
to obtain best NOI. The implementation of an intellig ent optimization can effectively help to get the optimal NOI. The performance of the consensus algorithm has considerably been improved by the inclusion of Particle Swarm Optimization (PSO). As a case study, variable number of nodes in a network with a random graph topology has been considered. Simulation results show that significant reduction in the NOI and power consumption has been achieved, where it decreased the NOI about 40 iteration; when using PSO for different number of nodes in the specified network.
Genetic Algorithms (GA) is a based population approach. It belongs to a metaheuristic procedure that uses population characteristics to guide the search. It maintains and improves multiple solutions which may produce a high-quality solution to an optimization problem. This study presents a comprehensive survey of the GA. We provide and discuss genetic algorithms for new researchers. We illustrate which components build up the GAs and view the main results on complexity time.
Smishing is a cybercriminal attack targeting mobile Short Message Service (SMS) devices that contains a malicious link, phone number, or email. The attacker intends to use this message to steal the victim's sensitive information, such as passwords, bank account details, and credit cards. One method of combating smishing is to raise awareness and educate users about the various tactics used by SMS phishers. But even so, this method has been criticized for becoming inefficient because smishing tactics are continually evolving. A more promising anti-smishing method is to use machine learning. This paper introduces a number of machine learning algorithms that can be used for detecting smishing. Furthermore, the differences and simil
... Show MoreWe use the idea of the grill. This study generalized a new sort of linked space like -connected and -hyperconnected and investigated its features, as well as the relationship between it and previously described notions. It also developed new sorts of functions, such as hyperconnected space, and identified their relationship by offering numerous instances and attributes that belong to this set. This set will serve as a starting point for further research into the set many future possibilities. We also use some theorems and observations previously studied and related to the grill and the semi-open to obtain results in this research. We applied the concept of connected to them and obtained results related to connected. The sources related t
... Show MoreTechnique was used to retail for analyzing atom beryllium ion cathode of an atom lithium to six pairs of functions wave which two ?????? and the rest of the casing moderation and to analyze atom lithium ion Mob atom beryllium to three pairs of functions wave pair of casing and the rest of the casing moderation using function wave Hartree Fock and each casing email wascalculate expected values ??....
Copper and Zinc powders with different particle sizes were subjected to sieving of range (20-100?m) and He-Ne laser system to determine the particle size . 1wt% from each powders was blended carefully with 99wt% from Iraqi oil . Microscopic examination were carried for all samples to reveal the particle size distribution . XRF intensity measurements were conducted for all suspended samples , and the relation between XRF intensity and the particle size was found .
The degradation performance of aqueous solution of pesticide Alachlor has been studied at solar pilot scale plant in two photocatalytic systems: homogeneous photocatalysis by photo-Fenton and heterogeneous photocatalysis with titanium dioxide. The pilot scale system included of compound parabolic collectors specially designed for solar photocatalytic applications, and installed at University of Baghdad, Department of Environmental Engineering back yard. The influence of different concentrations, H2O2 (200-2400 mg/l), Fe+2(5- 30 mg/l) and TiO2 (100-500 mg/l) and their relationship with the degradation efficiency were studied.
The COD removal efficienc
... Show MoreA compact microstrip six-port reflectometer (SPR) with extended bandwidth is proposed in this paper. The design is based on using 16-dB multi-section coupled line directional couplers and a multi-section 3-dB Wilkinson power divider operating from 1 to 6 GHz. The proposed SPR employs only two calibration standards: a matched load and an open load. As compared to other dielectric substrates, fabricating the proposed SPR involves using a low-cost (FR4) substrate. A novel algorithm is also proposed to estimate the complex reflection coefficient over the frequency ranges at which the standard performance of the circuit components is not fully satisfied. The new algorithm is based on the circles’ intersection points, which have been de
... Show MoreThis study synthesized nanocomposite photocatalyst materials from a mixture of Cu2O nanoparticles, ZnO nanoparticles, and graphene oxide (GO) through coprecipitation and hydrothermal methods. This study aims to determine the optimum composition of Cu2O/ZnO/GO nanocomposites in degrading methylene blue. The nanocomposite was synthesized in two steps: 1 the synthesis of Cu2O and ZnO nanoparticles through the coprecipitation method and the preparation of GO through the modified Hummer method. 2 The preparation of Cu2O and ZnO nanoparticles mixtures with GO through the hydrothermal method to form Cu2O/ZnO/GO nanocomposites. The adsorption-photocatalysis process of methylene blue
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show More