Wireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreIn order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf
... Show MoreBaghdad city has been faced numerous issues related to freshwater environment deteriorations due to many reasons, mainly was the discharge of wastewater without adequate treatment. Al-Rustamiya Wastewater Treatment Plant (WWTP) have been constructed among many plants in Baghdad city to reduce the amount of wastewater discharged into natural environment and its subsequent adverse effects. This study was conducted to evaluate the performance of the plant which consist of a conventional activated sludge (CAS) and sequencing batch reactors (SBR) systems as secondary treatment units and its ability to meet Iraqi specifications. A reliability level determination and analysis also were conducted to find the plant's stability an
... Show MoreThe economic units always sought to maintain its market position and Trchinh the technology management and modern methods that will support success factors .vdila about it has become a customer and one profitability analysis of the most practical way benefit of economic units as modern management focus their attention on achieving this satisfaction, as the customers make up the axis of the success of every organization and that there are many government units aiming to profit directs attention to customers and the number of these units increased continuously. The administration used the customer profitability analysis in order to obtain information to assist in making and decision-making process. How to use modern tec
... Show MoreOrthogonal Frequency Division Multiplexing (OFDM) is one of recent years multicarrier modulation used in order to combat the Inter Symbol Interference (ISI) introduced by frequency selective mobile radio channel. The circular extension of the data symbol, commonly referred to as cyclic prefix is one of the key elements in an OFDM transmission scheme. This paper study The influence of the cyclic prefix duration on the BER performance of an OFDM-VCPL (Orthogonal frequency division multiplexing - Variable Cyclic Prefix Length) system and the conventional OFDM system with frame 64-QAM modulation is evaluated by means of computer simulation in a multipath fading channel. The adaptation of CP is done with respect to the delay spread estimation
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show More