Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost issues in cluster-based WSNs simultaneously. The proposed methodology is evaluated for energy consumption, network lifetime, throughput, and packet delivery ratio and compared with the InFRA and DRINA. These protocols are cluster-based routing protocols which only aim to maximize the overlap routes for efficient data aggregation. Analysis and simulation results revealed that the WDARS delivered a longer network lifetime with more proficient and reliable performance over other methods.
Osteoporosis is related to the loss of bone mass that occurs as part of the natural process of aging and in menopausal women. The aim of this study is to evaluate the levels of interleukin-35 in menopausal women with osteoporosis, that may be used as an early predicted marker of osteoblastic and osteoclastic activity in osteoporosis patients in relation with other diagnostic parameters. Fasting blood samples were obtained from forty Iraqi menopausal women with mean age of (61.06±6.59)years who were newly diagnosed of osteoporosis by physicians at Baghdad Teaching Hospital as patients group(G1). In addition to , twenty two healthy women were included in the st
... Show MoreBackground: Otitis media with effusion is characterized by accumulation of fluid in the middle ear in absence of acute inflammation and it is the most common cause of acquired hearing loss in children, and may negatively affect language development failure of medical treatment of middle ear effusion frequently require myringotomy and tympanostomy tube insertion.
Objectives: To determine tympanostomy tube complications of tube in children with chronic otitis media with effusion who were treated with Shah Grommet tube insertion.
Methods: The Medical records of 162 ears of 87 children (52 male and 35 female) were reviewed respectively, the patients ages wer
... Show MoreBackground: Laparoscopic surgery for
appendicitis is now a well established and
advanced method of performing general surgical
procedures.
Objectives: To compare the outcome of
laparoscopic and open appendectomies in terms
of operative time, analgesic requirement,
postoperative complications, hospital stay, return
to normal activity and condition of scar.
Methods: This prospective study was carried
out from 1stMay 2008-1st January 2010, involving
110 patients (45 male and 65 female) with
features suggestive of acute appendicitis were
divided into 45 patients laparoscopic
appendectomy (LA) group and 65 patients open
appendectomy (OA) group, after taking informed
consent. LA was done with the
Atenolol was used with ammonium molybdate to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between atenolol and ammonium molybdate in an aqueous medium to obtain a dark brown precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.1-3.5 mmol/L for cell A and 0.3-3.5 mmol/L for cell B, and LOD 133.1680 ng/100 µL and 532.6720 ng/100 µL for cell A and cell B respectively with correlation coefficient (r) 0.9910 for cell A and 0.9901 for cell B, RSD% was lower than 1%, (n=8) for the determination of ate
... Show MoreInterleukin-38 (IL-38), an inflammatory cytokine discovered in recent years, has been implicated in the pathogenesis of systemic lupus erythematosus (SLE). IL-38 is encoded by the
DBNRAHA Hameed, IJRSSH PUBLICATION, 2018
Television culture has become the most dangerous of our time. It manipulates with minds and hearts together; and forms consciousness. It transforms societies into actual forces rejecting certain principles by guiding the media landscape through visible connotations acceptable to the public; or provokes the citizen against elements that put a burden on the viewer or the public in order to create a positive reaction to the subject of combating terrorism by combining these ads in line with what the public wants of security and tranquility and a decent living after suffering from terrorism in the past years.
Therefore, this research deals with television advertisements as one of the most important fo
... Show MoreDell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo
... Show MoreSteganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re
... Show MoreOne of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an
... Show More