Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader understand the principle of using IoT in such applications.
The study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla
... Show MoreThe research aims:
1- To know the intemperance use of the internet by the University's students.
2- To know the differences with a statistical indication in the intemperance use of the internet after the gender's inconstant ( Males-females).
3- To know the differences with a statistical indication in the intemperance use of the internet after the Major's inconstant ( scientific- humanistic)
This current research restricts a sample of the university students for both sexes.
Theoretical frame:
The research viewed several theories that explains intemperance use of the internet & the results.
Research measures :
1- Research has been adapted the scale ( Internet use) which was prepared by the Moroccan researcher (
An assembled pulsed Nd:YAG laser-robot system for spot welding similar and dissimilar metals is presented in this paper. The study evaluates the performance of this system through investigating the possibility and accuracy of executing laser spot welding of 0.2 mm in thickness stainless steel grade AISI302 to 0.5 mm in thickness low carbon steel grade AISI1008. The influence of laser beam parameters (peak power, pulse energy, pulse duration, repetition rate, and focal plane position on the final gained best results are evaluated. Enhancement of the experimental results was carried by a computational simulation using ANSYS FLUENT 6.3 package code.
Protection of the oil pipelineswhich extracted from the wells was found to shut the well and prevent the leakage of oil when broken using safety valve. This valve is automatically activated by loss of pressure between the well and pipelines, which take the pressure, signal from hydraulic pressure sensor through pressure control valve which has constant or variable value but it is regulated manually. The manual regulatory process requires the presence of monitoring workers continuously near the wells which are always found in remote areas. In this paper, a smart system has been proposed that work with proportional pressure control valve and also electronic pressure sensor through Arduino controller, which is programmed in a way that satisfie
... Show MoreA system was used to detect injuries in plant leaves by combining machine learning and the principles of image processing. A small agricultural robot was implemented for fine spraying by identifying infected leaves using image processing technology with four different forward speeds (35, 46, 63 and 80 cm/s). The results revealed that increasing the speed of the agricultural robot led to a decrease in the mount of supplements spraying and a detection percentage of infected plants. They also revealed a decrease in the percentage of supplements spraying by 46.89, 52.94, 63.07 and 76% with different forward speeds compared to the traditional method.
Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show MoreWhenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreWe have provided in this research model multi assignment with fuzzy function goal has been to build programming model is correct Integer Programming fogging after removing the case from the objective function data and convert it to real data .Pascal triangular graded mean using Pascal way to the center of the triangular.
The data processing to get rid of the case fogging which is surrounded by using an Excel 2007 either model multi assignment has been used program LNDO to reach the optimal solution, which represents less than what can be from time to accomplish a number of tasks by the number of employees on the specific amount of the Internet, also included a search on some of the
... Show More