Preferred Language
Articles
/
joe-83
Enhanced Performance of Consensus Wireless Sensor Controlled System via Particle Swarm Optimization Algorithm
...Show More Authors

     This paper describes the application of consensus optimization for Wireless Sensor Network (WSN) system. Consensus algorithm is usually conducted within a certain number of iterations for a given graph topology. Nevertheless, the best Number of Iterations (NOI) to reach consensus is varied in accordance with any change in number of nodes or other parameters of . graph topology. As a result, a time consuming trial and error procedure will necessary be applied
to obtain best NOI. The implementation of an intellig ent optimization can effectively help to get the optimal NOI. The performance of the consensus algorithm has considerably been improved by the inclusion of Particle Swarm Optimization (PSO). As a case study, variable number of nodes in a network with a random graph topology has been considered. Simulation results show that significant reduction in the NOI and power consumption has been achieved, where it decreased the NOI about 40 iteration; when using PSO for different number of nodes in the specified network.
 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Anemia Blood Cell localization Using Modified K- Means Algorithm
...Show More Authors

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
An Optimal Algorithm for Resource Allocation in D2D Communication
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Thu Nov 15 2018
Journal Name
Pakistan Journal Of Biological Sciences
Immunomodulation of Zerumbone via Decreasing the Production of Reactive Oxygen Species from Immune Cells
...Show More Authors

View Publication
Scopus (20)
Crossref (12)
Scopus Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Irregularities dyed bin Faraj Imam Malik             Via                   Book of jurisprudence laws of Ibn Jizi
...Show More Authors

It has been the name of the name forward dyed Ben Faraj when reading and my research in the books of jurisprudence, especially books Maliki school…
   And I saw that I offer a service to this favorite world, by devoting him to research on the issues that are unique to one of the opinions of Imam Malik (may Allah be pleased with him), and through browsing the books of Maliki, I found what I want in the book of jurisprudence laws, Imam Muhammad bin Ahmed bin Jazzi It has found six issues, and these issues, including what he had a single opinion of the doctrine, and what one of the opinion of Imam Malik, has presented the provisions of these issues to other schools of jurisprudence, and simplified research Vqarna in term

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 10 2023
Journal Name
Energies
Well Placement Optimization through the Triple-Completion Gas and Downhole Water Sink-Assisted Gravity Drainage (TC-GDWS-AGD) EOR Process
...Show More Authors

Gas and downhole water sink-assisted gravity drainage (GDWS-AGD) is a new process of enhanced oil recovery (EOR) in oil reservoirs underlain by large bottom aquifers. The process is capital intensive as it requires the construction of dual-completed wells for oil production and water drainage and additional multiple vertical gas-injection wells. The costs could be substantially reduced by eliminating the gas-injection wells and using triple-completed multi-functional wells. These wells are dubbed triple-completion-GDWS-AGD (TC-GDWS-AGD). In this work, we design and optimize the TC-GDWS-AGD oil recovery process in a fictitious oil reservoir (Punq-S3) that emulates a real North Sea oil field. The design aims at maximum oil recovery us

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Process Optimization Study of Pb(II) Removal by Bulk Liquid Membrane (BLM)
...Show More Authors

   Box-Wilson experimental design method was employed to optimized lead ions removal efficiency by bulk liquid membrane (BLM) method. The optimization procedure was primarily based on four impartial relevant parameters: pH of feed phase (4-6), pH of stripping phase (9-11), carrier concentration TBP (5-10) %, and initial metal concentration (60-120 ppm). maximum recovery efficiency of lead ions is 83.852% was virtually done following thirty one-of-a-kind experimental runs, as exact through 24-Central Composite Design (CCD). The best values for the aforementioned four parameters, corresponding to the most restoration efficiency were: 5, 10, 7.5% (v/v), and 90 mg/l, respectively. The obtained experimental data had been

... Show More
View Publication Preview PDF
Crossref (3)
Crossref