Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classification approach, hence strengthening the safety of such networks. Feature extraction process is done by using Linear Regression-Based Principal Component Analysis (LR-PCA). The test results demonstrated that the proposed IGO-ANN method attains the greatest performance in terms of accuracy, end to end delay and packet delivery ratio regarding trusted WBAN nodes classification than certain existing methods.
This paper deals with the Magnetohydrodynyamic (Mill)) flow for a viscoclastic fluid of the generalized Oldroyd-B model. The fractional calculus approach is used to establish the constitutive relationship of the non-Newtonian fluid model. Exact analytic solutions for the velocity and shear stress fields in terms of the Fox H-function are obtained by using discrete Laplace transform. The effect of different parameter that controlled the motion and shear stress equations are studied through plotting using the MATHEMATICA-8 software.
This paper represents an experimentalattempt to predict the influence of CO2-MAG welding variables on the shape factors of the weld joint geometry. Theinput variables were welding arc voltage, wire feeding speed and gas flow rate to investigate their effects on the shape factorsof the weld joint geometry in terms of weld joint dimensions (bead width, reinforcement height, and penetration). Design of experiment with response surface methodology technique was employed to buildmathematical models for shape factors in terms of the input welding variables. Thepredicted models were found quadratic type and statistically checked by ANOVA analysis for adequacy purpose. Also, numerical and graphical optimizations were carried out
... Show MoreIn today's world, the science of bioinformatics is developing rapidly, especially with regard to the analysis and study of biological networks. Scientists have used various nature-inspired algorithms to find protein complexes in protein-protein interaction (PPI) networks. These networks help scientists guess the molecular function of unknown proteins and show how cells work regularly. It is very common in PPI networks for a protein to participate in multiple functions and belong to many complexes, and as a result, complexes may overlap in the PPI networks. However, developing an efficient and reliable method to address the problem of detecting overlapping protein complexes remains a challenge since it is considered a complex and har
... Show MoreTwo different approaches, univariate and multivariate (simplex method), have been used to obtain the optimum conditions for the quantitative Spectrophotometric determination of Eu3+ using Solochrome violet RS (3-Hydroxy-4-(2-hydroxy phenyl azo) naphthalene -1sulfonic acid) (SVRS) as a chromogenic reagent. The investigation shows that Eu3+ ion forms a wine-red complex with SVRS in alkaline buffer solution having a maximum absorbance at 464 nm against reagent blank. Calibration graphs obtained under univariate and simplex were found to be linear in the range of (0.30-8.0) µg/ml with detection limit 0.061µg/ml and molar absorptivity of 9877.66 L/mol.cm and (0.40-10.0)µg/ml with
... Show MoreAbstract
The aim of this paper is to model and optimize the fatigue life and hardness of medium carbon steel CK35 subjected to dynamic buckling. Different ranges of shot peening time (STP) and critical points of slenderness ratio which is between the long and intermediate columns, as input factors, were used to obtain their influences on the fatigue life and hardness, as main responses. Experimental measurements of shot peening time and buckling were taken and analyzed using (DESIGN EXPERT 8) experimental design software which was used for modeling and optimization purposes. Mathematical models of responses were obtained and analyzed by ANOVA variance to verify the adequacy of the models. The resul
... Show MoreThe aim of this research is to investigation the optimization of the machining parameters (spindle speed, feed rate, depth of cut, diameter of cutter and number of flutes of cutter) of surface roughness for free-form surface of composite material (Aluminum 6061 reinforced boron carbide) by using HSS uncoated flat end mill cutters which are rare use of the free-form surface. Side milling (profile) is the method used in this study by CNC vertical milling machine. The purpose of using ANFIS to obtain the better prediction of surface roughness values and decreased of the error prediction value and get optimum machining parameters by using Taguchi method for the best surface roughness at spindle speed 4500 r.p.m, 920mm/rev feed rate, 0.6mm de
... Show MoreIn this paper a comparison of the experimental of evacuated tube solar water heater systems with and without mirror flat reflector. The aim of using the reflector to improve thermal efficiency, and the data gathered which are (temperature, solar irradiation and time) for three days were compared. the results from compared data the temperature lower increase in evacuated tube solar water heater system without reflector than the temperature increase in evacuated tube solar water heater system with reflector .The results show (53, 39, 35) % for three days respectively that the evacuated tube solar water heater system with reflector has higher thermal efficiencies than the results (47, 28, 30) % for three days respectively thermal efficiencies
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.