Preferred Language
Articles
/
joe-888
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has shown that its execution time fastest among AES, 3DES and DES 15%, 55% and 17%.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Euro Dinar Trading Analysis Using WARIMA Hybrid Model
...Show More Authors

The rise in the general level of prices in Iraq makes the local commodity less able to compete with other commodities, which leads to an increase in the amount of imports and a decrease in the amount of exports, since it raises demand for foreign currencies while decreasing demand for the local currency, which leads to a decrease in the exchange rate of the local currency in exchange for an increase in the exchange rate of currencies. This is one of the most important factors affecting the determination of the exchange rate and its fluctuations. This research deals with the currency of the European Euro and its impact against the Iraqi dinar. To make an accurate prediction for any process, modern methods can be used through which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Structure for Modeling and Controlling Nonlinear Systems
...Show More Authors

This paper proposes a new structure of the hybrid neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Weight parameters of the hybrid neural structure with its serial-parallel configuration are adapted by using the Back propagation learning algorithm. The ability of the proposed hybrid neural structure for nonlinear system has achieved a fast learning with minimum number

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Networks And Systems
Proceedings of Ninth International Congress on Information and Communication Technology
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
View Publication
Crossref
Publication Date
Mon Jul 21 2025
Journal Name
Sciences Journal Of Physical Education
Leadership patterns for university student activities managers according to the Blake and Moton model (The managerial Grid)
...Show More Authors

The researcher is one of the workers in university sports student activities, as he noticed that there is a diversity in the use of leadership patterns among managers of student activities in Iraqi universities between one director and another, which leads to the impact of these leadership styles on performance, positive or negative, in the level of human relations and the achievement of results. The researcher adopted the descriptive method in the survey method with relational relationships. The research sample consisted of (184) sports coaches who represent (27) universities and governmental and private colleges. To achieve the research objectives, the researcher used the Statistical Package for Social Sciences (Spss). To extract.statisti

... Show More
View Publication
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Neuro-Self Tuning Adaptive Controller for Non-Linear Dynamical Systems
...Show More Authors

In this paper, a self-tuning adaptive neural controller strategy for unknown nonlinear system is presented. The system considered is described by an unknown NARMA-L2 model and a feedforward neural network is used to learn the model with two stages. The first stage is learned off-line with two configuration serial-parallel model & parallel model to ensure that model output is equal to actual output of the system & to find the jacobain of the system. Which appears to be of critical importance parameter as it is used for the feedback controller and the second stage is learned on-line to modify the weights of the model in order to control the variable parameters that will occur to the system. A back propagation neural network is appl

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2015
Journal Name
International Journal Of Modern Trends In Engineering And Research (ijmter)
Effect of changing hidden neurons and activation function on Back Propagation (BP) Speed
...Show More Authors

The Back-Propagation (BP) is the best known and widely used learning algorithm in training multiple neural network. A vast variety of improvements to BP algorithm have been proposed since ninety’s. in this paper, the effects of changing the number of hidden neurons and activation equation are investigated. According to the simulation results, the convergence speed have been improved and become much faster by the previous two modifications on the BP algorithm.

Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Frequency analyses of human voice using fast Fourier transform
...Show More Authors

Quantitative analysis of human voice has been subject of interest and the subject gained momentum when human voice was identified as a modality for human authentication and identification. The main organ responsible for production of sound is larynx and the structure of larynx along with its physical properties and modes of vibration determine the nature and quality of sound produced. There has been lot of work from the point of view of fundamental frequency of sound and its characteristics. With the introduction of additional applications of human voice interest grew in other characteristics of sound and possibility of extracting useful features from human voice. We conducted a study using Fast Fourier Transform (FFT) technique to analy

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF