An efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols in two phases: The first phase is used to evaluate the route quality and networks’ energy consumption on small WSN with one mobile Sink Node (SN) and GMSs. The second phase, is used to evaluate the route quality and networks’ energy consumption on large network (four WSNs) with GMSs. The two phases are implementated by creating five sceneries via using NS2.3 simulator software. The implementation results of the proposed performance evaluation technique have demonstrated that SMSNDRP gives better networks’ energy consumption on small single network in comparison with KM-DGP. Also, it gives high quality route in large network that used four mobile SN, in contrast to KM-DGP that used sixteen mobile SNs. While in large network, it found that KM-DGP with sixteen mobile SNs gives better networks’ energy consumption in comparison with SMSNDRP with four mobile SNs.
Ge-Au infrared photoconductive detection was prepared from germanium single crystal which were doped with different gold concentration using thermal evaporation. The spectral resonsivity (Rλ), spectral detectivity (D*) were determined as function of wavelength, also the resistance, conductivity in dark and with illumination to infrared radiation, the gain and relative photo response have been measured with different gold concentration. Remarkable improvements in the photoresponse gain were observed for the highest resistance specimen at the expense of spectral detectivity values.
The objective of this study is to evaluate the effect of aspirin, clopidogrel or their combination on different parameters in hypertensive patients.Platelets adhesion, activation, and aggregation are central to thrombus formation, which follows atherosclerotic plaque disruption and causes acute coronary syndromes. Aspirin and clopidogrel exert their antiplatelet effects by inhibiting thromboxane A2 production and adenosine diphosphate–induced platelet aggregation pathways, respectively. This study was designed to evaluate the possible effects of aspirin and clopidogrel given either alone or in combination in patients with essential hypertension on blood pressure and other parameters in addition to lipid profile using a randomized
... Show MoreThis paper is based on the Sentinel-2 satellite data: the thermal, red, and NIR bands. The Babylon city was chosen in this study for different reasons: its location in the middle of Iraq and it represents the largest capitals of the Mesopotamia civilization in the word. The Land Surface Temperature (LST) was determined using a method that incorporates remote sensing, geographic information systems, and statistics. This process has made it possible to monitor the relationship between land usage and the land surface temperature for four seasons in the year 2021. The mapswere processed and analyzed by using ArcGIS software. Five maps of the LST were constructed. Each map represents diffe
Klebsiella pneumoniae is among the most frequent microorganisms isolated from infections of burn wounds. This cross-sectional study aimed to investigate the distribution of multi-drug resistant (MDR) K. pneumoniae in two burn hospitals and the antibiotic resistance profile in different burn regions of the same patient. It was performed in two hospitals (Al-Zahraa and Al-Karama) in Al-Kut, Iraq, between January and May 2022. Totally, 100 burn swabs were collected from 40 patients of both genders suffering from burn wound infections, with ages ranging between 3 and 50 years. Klebsiella pneumoniae were isolated and identified using conventional methods followed by VITEK®2 system and confirmed via polymerase chain reaction targeting t
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreThe Gaussian orthogonal ensemble (GOE) version of the random matrix theory (RMT) has been used to study the level density following up the proton interaction with 44Ca, 48Ti and 56Fe.
A promising analysis method has been implemented based on the available data of the resonance spacing, where widths are associated with Porter Thomas distribution. The calculated level density for the compound nuclei 45Sc,49Vand 57Co shows a parity and spin dependence, where for Sc a discrepancy in level density distinguished from this analysis probably due to the spin misassignment .The present results show an acceptable agreement with the combinatorial method of level density.
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreThe researchers have a special interest in studying Markov chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one of the ministries. Results are analyzed by applying Maximum likelihood estimation and Ordinary least squares methods resulting
... Show MoreIn many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte
... Show More