The issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r
... Show MoreTitle: Arabic Manuscript, Concepts and Terms and Their Impact on Determining Its Historical beginnings and extension of its existence.
Researcher: Dr. Atallah Madb Hammadi Zubaie.
Bn the name of Allah Most Merciful
The interest in manuscripts and rules of their investigation and dissemination appeared soon, and the speech in editing terms and concepts appeared in sooner time. When looking at the classified books in the Arab manuscripts , we find the books of the first generation did not allude definition for this term , but rather focused on the importance of manuscripts and their existence locations, indexing, care, and verification rules. The reason for this is that the science of Arabic manuscrip
... Show MoreBackground: Post-extraction alveolar ridge resorption is unavoidable phenomenon ending with insufficient ridge width. Measuring the physical dimensions of the available bone before implant surgery is an important aspect of diagnosis and treatment planning. Bone height can be calculated from radiographs, while bucco-lingual ridge width can be measured by conventional tomography, CT scanning and ridge mapping.
Radiographic techniques have certain disadvantages. Therefore the ridge mapping technique was used as an option for determining alveolar ridge width.
The purpose of this study was to compare the validity of alveolar ridge width measurements obtained with ridge mapping technique before surgical flap reflection against
... Show MoreThis study carried out in animal field in the Department of animal production /Faculty of Agriculture /University of Baghdad, Al Gadria Campus. 80 Japanese quail divided into four parameters used in this study. These quails are treated with boron (B) in the diets (boric acid 16% B) with concentration 0, 50, 75, 100 mg /kg. diets for 120 hours. the following characteristics are examined: changes in the rate of body weight (BL), concentrate of hemoglobin (Hb), hematocrit (PCV%), and the ratio of heterophile to Lymphocyte (H/L ratio). The results indicated that the high levels of B led to a Significant decrease in BL and significantly increased in hematocrit PCV% with significant decrease in Hb, and increasing in the H/L ratio. The anatomy of
... Show MoreRisk identification and assessment can be analysed using many risk management tools. Fishbone diagram is one of these techniques which can be employed, for the identification of the causes behind the construction failure, which has become a phenomenon that often gets repeated in several projects. If these failures are not understood and handled scientifically, it may lead to disputes between the project parties. Additionally, the construction failure also leads to an increase in the project budget, which in turn causes a delay in the completion of the projects. Punching shear in reinforcement slab may be one of the reasons for construction failures. However, there are many doubts about other causes that lead to this failure as w
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreCompaction curves are widely used in civil engineering especially for road constructions, embankments, etc. Obtaining the precise amount of Optimum Moisture Content (OMC) that gives the Maximum Dry Unit weight gdmax. is very important, where the desired soil strength can be achieved in addition to economic aspects.
In this paper, three peak functions were used to obtain the OMC and gdmax. through curve fitting for the values obtained from Standard Proctor Test. Another surface fitting was also used to model the Ohio’s compaction curves that represent the very large variation of compacted soil types.
The results showed very good correlation between the values obtained from some publ
... Show More