An efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols in two phases: The first phase is used to evaluate the route quality and networks’ energy consumption on small WSN with one mobile Sink Node (SN) and GMSs. The second phase, is used to evaluate the route quality and networks’ energy consumption on large network (four WSNs) with GMSs. The two phases are implementated by creating five sceneries via using NS2.3 simulator software. The implementation results of the proposed performance evaluation technique have demonstrated that SMSNDRP gives better networks’ energy consumption on small single network in comparison with KM-DGP. Also, it gives high quality route in large network that used four mobile SN, in contrast to KM-DGP that used sixteen mobile SNs. While in large network, it found that KM-DGP with sixteen mobile SNs gives better networks’ energy consumption in comparison with SMSNDRP with four mobile SNs.
A new benzylidene derivative, namely N-benzylidene-5-phenyl-1,3,4-thiadiazol-2-amine (BPTA), has been synthesized and instrumentally confirmed with Elemental Analysis (CHN), Nuclear Magnetic Resonance (NMR), and Fourier Transform Infrared Spectroscopy (FT-IR). Titanium Dioxide (TiO2) nanoparticles (NPs) were synthesized and characterized by X-ray. The mutualistic complementary dependence of BPTA with TiO2 nanoparticles as anti-corrosive inhibitor on mild steel (MS) in 1.0 M hydrochloric acid has been tested at various concentrations and various temperatures. The methodological work was achieved by gravimetric measurement methods complemented with surface analysis. The synthesized inhibitor concentrations were 0.1 mM to 0.5 mM and the temper
... Show MoreBackground: The purpose of this study was to evaluate and compare centering ability and canal transportation of simulated S-shaped canals instrumented with four different types of rotary nickel-titanium systems. Materials and Methods: Forty simulated S-shaped canals in resin blocks were divided into four groups of ten each and were instrumented to an apical size 25 by different instrumentation technique using ProTaper Universal files (group A), ProTaperNext (group B), Reciproc (group C) and WaveOne (group D).Centering ability and canal transportation was measured at (11) measuring points from D0 to D10 bysuperimposion of the pre- and post-operative images obtained by using digital camera in standardized manner. An assessment of the canals
... Show MoreDue to the significance of hospital drinking water, a study was done to assess the water in three hospitals in Baghdad (Al-Yarmouk Teaching Hospital, Ibn Sina Hospital, and Ibn-Al-Nafis Hospital) for its nature and quality, compare it to other hospitals in terms of its physical, chemical, and bacterial specifications, and compare it to international standards. According to Iraqi standards from 2009 and WHO standards from 2011, Chemical factors were measured, which included pH, Total Dissolved Solids (TDS), and Calcium Ion (Ca+2). Reported readings are all within acceptable ranges for drinking water. In contrast, turbidity, total hardness (T.H.), chlorides (Cl-), magnesium (Mg+2), the number of aerobic plates (APC), total coliform (T
... Show MoreIn this paper, one of the Machine Scheduling Problems is studied, which is the problem of scheduling a number of products (n-jobs) on one (single) machine with the multi-criteria objective function. These functions are (completion time, the tardiness, the earliness, and the late work) which formulated as . The branch and bound (BAB) method are used as the main method for solving the problem, where four upper bounds and one lower bound are proposed and a number of dominance rules are considered to reduce the number of branches in the search tree. The genetic algorithm (GA) and the particle swarm optimization (PSO) are used to obtain two of the upper bounds. The computational results are calculated by coding (progr
... Show MoreExtractive multi-document text summarization – a summarization with the aim of removing redundant information in a document collection while preserving its salient sentences – has recently enjoyed a large interest in proposing automatic models. This paper proposes an extractive multi-document text summarization model based on genetic algorithm (GA). First, the problem is modeled as a discrete optimization problem and a specific fitness function is designed to effectively cope with the proposed model. Then, a binary-encoded representation together with a heuristic mutation and a local repair operators are proposed to characterize the adopted GA. Experiments are applied to ten topics from Document Understanding Conference DUC2002 datas
... Show MoreFinancial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show MoreNowad ays, with the development of internet communication that provides many facilities to the user leads in turn to growing unauthorized access. As a result, intrusion detection system (IDS) becomes necessary to provide a high level of security for huge amount of information transferred in the network to protect them from threats. One of the main challenges for IDS is the high dimensionality of the feature space and how the relevant features to distinguish the normal network traffic from attack network are selected. In this paper, multi-objective evolutionary algorithm with decomposition (MOEA/D) and MOEA/D with the injection of a proposed local search operator are adopted to solve the Multi-objective optimization (MOO) followed by Naï
... Show MoreThe theory of Multi-Criteria Decision Making (MCDM) was introduced in the second half of the twentieth century and aids the decision maker to resolve problems when interacting criteria are involved and need to be evaluated. In this paper, we apply MCDM on the problem of the best drug for rheumatoid arthritis disease. Then, we solve the MCDM problem via -Sugeno measure and the Choquet integral to provide realistic values in the process of selecting the most appropriate drug. The approach confirms the proper interpretation of multi-criteria decision making in the drug ranking for rheumatoid arthritis.