Remote surveying of unknown bound geometries, such as the mapping of underground water supplies and tunnels, remains a challenging task. The obstacles and absorption in media make the long-distance telecommunication and localization process inefficient due to mobile sensors’ power limitations. This work develops a new short-range sequential localization approach to reduce the required amount of signal transmission power. The developed algorithm is based on a sequential localization process that can utilize a multitude of randomly distributed wireless sensors while only employing several anchors in the process. Time delay elliptic and frequency range techniques are employed in developing the proposed algebraic closed-form solution. The proposed method is highly effective as it reaches the Cramer–Rao Lower Bound performance level. The estimated positions can act as initializations for the iterative Maximum Likelihood Estimator (MLE) via the Taylor series linearization to acquire even higher positioning accuracy as needed. By reducing the need for high power at the transmit modules in the sensors, the developed localization approach can be used to design a compact sensor with low power consumption and greater longevity that can be utilized to explore unknown bounded geometries for life-long efficient observation mapping.
This research is carried out to investigate the behavior of self-compacting concrete (SCC) two-way slabs with central square opening under uniformly distributed loads. The experimental part of this research is based on casting and testing six SCC simply supported square slabs having the same dimentions and reinforcement. One of these slabs was cast without opening as a control slab. While, the other five slabs having opening ratios (OR) of 2.78%, 6.25%, 11.11%, 17.36% and 25.00%. From the experimental results it is found that the maximum percentage decrease in cracking and ultimate uniform loads were 31.82% and 12.17% compared to control slab for opening ratios (OR
... Show MoreThe investigation of natural convection in an annular space between two concentric cylinders partially filled with metal foam is introduced numerically. The metal foam is inserted with a new suggested design that includes the distribution of metal foam in the annular space, not only in the redial direction, but also with the angular direction. Temperatures of inner and outer cylinders are maintained at constant value in which inner cylinder temperature is higher than the outer one. Naiver Stokes equation with Boussinesq approximation is used for fluid regime while Brinkman-Forchheimer Darcy model used for metal foam. In addition, the local thermal equilibrium condition in the energy e
The developed financial system is essential for increasing economic growth and poverty reduction in the world. The financial development helps in poverty reduction indirectly via intermediate channel which is the economic growth. The financial development enhancing economic development through mobilization of savings and channel them to the most efficient uses with higher economic and social returns. In addition, the economic growth reduces the poverty through two channels. The first is direct by increasing the introduction factors held by poor and improve the situations into the sectors and areas where the poor live. The second is indirect through redistribution the realized incomes from the economic growth as well as the realiz
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere
... Show MoreStarting with a problem of the weakness of accounting disclosure in some companies administration when preparing and presenting the financial reports which are submitted to the Tax authority. This problem impacts on Tax authority performance (The effect on the quality of the performance of the tax authority), because of the lack of conviction for the information contained in those reports, and the failure to achieve accurate results in tax authority performance that leads to a negative impact on determining taxable income and affect tax revenue, as well as negative impact on determining taxable income and affect tax revenue, as well as negati
... Show MoreThe technology in continuous and quick development, that reflects in all parts of our life and interred both scientific and practical fields. Marketing is one of them, a customer’s way to deal with choosing and demanding the product deferent from the traditional way. Some of the buying processes are electronic now, therefore the current research is identifying the digital channels that entered the world of marketing and influenced the activities and types that fall under this name and how it affects in positioning strategy, which is how to install the product or brand in the mind of the customer and was dimensions (brand identity, brand personality, brand communication, brand awareness, brand image), The researcher took t
... Show MorePhotonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and the characterization of a relative humidity sensor based on a polymer-coated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) transmission mode. The fabrication of the sensor involved splicing a short (1 cm) length of Photonic Crystal Fiber (PCF) between two single-mode fibers (SMF). It was then coated with a layer of agarose solution. Experimental results showed that a high humidity sensitivity of 29.37 pm/%RH was achieved within a measurement range of 27–95%RH. The sensor also showed good repeatability, small size, measurement accuracy and wide humidity range. The RH sensitivity o
... Show MoreThe sensors based on Nickel oxide doped chromic oxide (NiO: Cr2O3) nanoparticals were fabricated using thick-film screen printing of sol-gel grown powders. The structural, morphological investigations were carried out using XRD, AFM, and FESEM. Furthermore, the gas responsivity were evaluated towards the NH3 and NO2 gas. The NiO0.10: Cr2O3 nanoparticles exhibited excellent response of 95 % at 100oC and better selectivity towards NH3 with low response and recovery time as compared to pure Cr2O3 and can stand as reliable sensor element for NH3 sensor related applications.
Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show More