The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobile SN, besides prolong the network lifetime in compare with static SN.
Achieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreCurrently and under the COVID-19 which is considered as a kind of disaster or even any other natural or manmade disasters, this study was confirmed to be important especially when the society is proceeding to recover and reduce the risks of as possible as injuries. These disasters are leading somehow to paralyze the activities of society as what happened in the period of COVID-19, therefore, more efforts were to be focused for the management of disasters in different ways to reduce their risks such as working from distance or planning solutions digitally and send them to the source of control and hence how most countries overcame this stage of disaster (COVID-19) and collapse. Artificial intelligence should be used when there is no practica
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreAccording to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through
... Show MoreActual and effective organizational dynamic capabilities in the work environment contribute to a number of factors that contribute to the organization's ability to manage its human talents. Thus, the study sought to identify the level of contribution of organizational dynamic capabilities to human talent management based on their dimensions in the investigated organization by determining the level of relationship and impact between these variables. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate sample of (42) administrative leaders in the investigated organization and adopte
... Show MoreThe recognition of the dynamic organizational capabilities in their actual and influential extent in the work environment achieves a set of positive data that can fall under the addition axes, particularly with regard to the organization's ability to manage human talents in them, so the researchers sought to identify the level of contribution of dynamic organizational capabilities in the management of human talents in terms of Keep them away in the research organization by indicating the level of relationship and impact between them. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate
... Show More