Preferred Language
Articles
/
qRZ5l4cBVTCNdQwCC1dy
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost issues in cluster-based WSNs simultaneously. The proposed methodology is evaluated for energy consumption, network lifetime, throughput, and packet delivery ratio and compared with the InFRA and DRINA. These protocols are cluster-based routing protocols which only aim to maximize the overlap routes for efficient data aggregation. Analysis and simulation results revealed that the WDARS delivered a longer network lifetime with more proficient and reliable performance over other methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Estimation Methods Of GM(1,1) Model With Missing Data and Practical Application
...Show More Authors

This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt  properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1)  is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method  (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Development of an Attendance System Based on Cloud / Fog Computing with Data Recovery Capability
...Show More Authors

Given the high importance of attendance for university students, upon which the possibility of keeping or losing their places in the course is based, it is essential to replace the inefficient manual method of attendance recording with a more efficient one.  To handle this problem, technology must be introduced into this process. This paper aims to propose an automatic attendance system based on passive Radio Frequency Identification (RFID), fog, and cloud computing technologies (AASCF). The system has three sides. The first one, which is the Client-side; works on collecting the attendance data then sending a copy from it. The second side, which is the Server-side, works on calculating an absence ratio of all the students during the

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Statistics And Its Interface
Search for risk haplotype segments with GWAS data by use of finite mixture models
...Show More Authors

The region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
The Product of Automorphic Weighted Composition Operators on Hardy Space H <sup>2</sup>
...Show More Authors
Abstract<p>Let <inline-formula> <tex-math><?CDATA $n\in {\mathbb{N}},{p}_{i}\in {\rm{U}},{\alpha }_{{P}_{i}}(z)=\frac{{p}_{i}-z}{1-{\bar{p}}_{i}z}(z\in {\rm{U}})$?></tex-math> <math xmlns:mml="http://www.w3.org/1998/Math/MathML" overflow="scroll"> <mrow> <mi>n</mi> <mo>∈</mo> <mi>ℕ</mi> <mo>,</mo> <msub> <mi>p</mi> <mi>i</mi> </msub></mrow></math></inline-formula></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Impact of evaluation of investment projects in achieving competitive strategy
...Show More Authors

The aim of the research is to determine the impact of evaluation of investment projects after the preparation of investment budgets taking into consideration within the investment budgets the concept of competitive strategy, as the harmony between the preparation of investment budgets and competitive strategy will contribute to the success of economic unity and achieve profits well and achieve a competitive advantage. Strategies for economic units because the most important factor to them is the costs produced and the progress of the research problem is focused on "Is it possible to include a strategy of competition, especially within the investment budget when prepared The study concluded that the investment plan prepared by the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Evaluation of the blood transfusion strategy in Baghdad Teaching Hospital
...Show More Authors

Background: Guidelines for blood products transfusion are needed to avoid unnecessary blood transfusion in acute and chronic anaemias to minimize complications.
Objective: To evaluate the practice of blood transfusion in Baghdad Teaching Hospital.
Patients and methods: One hundred and sixty adults Iraqi patients, who had blood transfusion, were selected randomly from different wards of Baghdad Teaching Hospital including General Medicine (GM), General Surgery (GS), Gynecology/Obstetrics (G/O), forty patients from each ward, from October 2011 to October 2012. Collected data included age, gender, type of ward, indication for transfusion, pre-transfusion packed cell volume (PCV) and hemoglobin (Hb), type (whole blood or red blood cell

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Evaluation of the blood transfusion strategy in Baghdad Teaching Hospital
...Show More Authors

Background: Guidelines for blood products transfusion are needed to avoid unnecessary blood transfusion in acute and chronic anaemias to minimize complications.
Objective: To evaluate the practice of blood transfusion in Baghdad Teaching Hospital.
Patients and methods: One hundred and sixty adults Iraqi patients, who had blood transfusion, were selected randomly from different wards of Baghdad Teaching Hospital including General Medicine (GM), General Surgery (GS), Gynecology/Obstetrics (G/O), forty patients from each ward, from October 2011 to October 2012. Collected data included age, gender, type of ward, indication for transfusion, pre-transfusion packed cell volume (PCV) and hemoglobin (Hb), type (whole blood or red blood cell

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Res Militaris
The Effect of Internal Control in Supporting the Implementation of Cost Techniques in Iraqi Companies
...Show More Authors

In the last few years, there have been a lot of changes in the economy, society, and the environment. This has led to much competition between companies, directly and indirectly affecting production and marketing processes. Most companies are trying to cut production and manufacturing costs by using modern cost techniques such as product life cycle costing and Continuous Improvement (Kaizen) technology, in the method of measuring production costs or service costs, and the need for internal control to keep an eye on how these technologies are being used and how well they work. And to find out the effect of internal control on the implementation of costing techniques in Iraqi companies, 64 questionnaires were given to people who work in the i

... Show More
Scopus
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More