In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonical definition for network lifetime in the IoT is to increase the period of cooperation between objects to carry out all the assigned tasks. The main contribution in this paper is to address the problem of task allocation in the IoT as an optimization problem with a lifetime-aware model. A genetic algorithm is proposed as a task allocation protocol. For the proposed algorithm, a problem-tailored individual representation and a modified uniform crossover are designed. Further, the individual initialization and perturbation operators (crossover and mutation) are designed so as to remedy the infeasibility of any solution located or reached by the proposed genetic algorithm. The results showed reasonable performance for the proposed genetic-based task allocation protocol. Further, the results prove the necessity for designing problem-specific operators instead of adopting the canonical counterparts.
في بداية الستينيات ظهرت شبكة الإنترنت لاستعمالها في أغراض غير تجارية ، ثم تطورت بشكل مذهل خلال السنوات الأخيرة، فبعد أن كانت مجرد شبكة صغيرة أصبحت الآن تضم ملايين المستخدمين حول العالم ، وتحولت من مجرد شبكة بحث أكاديمي إلى بيئة متكاملة للاستثمار والعمل والإنتاج والإعلام والحصول على المعلومات .
وفي بداية تأسيس الشبكة لم يكن ثمة اهتمام بمسائل الأمن بقدر ما كان الاهتمام ببنائها وتوسيع نش
... Show MoreThe present research aims at recognizing the difficulties and problems which hamper teachers and educators alike when using the internet for educational purposes.It discusses the benefits of the internet as a source of information or publication and as a communicative tool.Arandom sample of (30) teachers working at schools in Baghdad / Second Risafa,was selected.Three of the sample members use the internet for student project plans via internet centers, whereas 16 of them use it for chatting, emailing and research purposes.The rest of the sample have limited knowledge of the internet. The researcher used the interviewing method to gather data from
... Show MoreMarriage is considered one of the strongest ties that links between two human beings , but after the evolutions that happened in our Arab communities and specifically in the Iraqi community , marriage through the internet websites appeared . this kind of marriage is considered one of the new phenomena that appeared in the present time in many societies. That was through internet websites like yahoo , Facebook and other websites that have chat features.
The Islamic sharia looks negatively at marriage through the internet announcing that this way is harmful for both the man and the woman
Artificial fish swarm algorithm (AFSA) is one of the critical swarm intelligent algorithms. In this 
paper, the authors decide to enhance AFSA via diversity operators (AFSA-DO). The diversity operators will 
be producing more diverse solutions for AFSA to obtain reasonable resolutions. AFSA-DO has been used to 
solve flexible job shop scheduling problems (FJSSP). However, the FJSSP is a significant problem in the 
domain of optimization and operation research. Several research papers dealt with methods of solving this 
issue, including forms of intelligence of the swarms. In this paper, a set of FJSSP target samples are tested 
employing the improved algorithm to confirm its effectiveness and evaluate its ex
A model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga
... Show MoreThe study using Nonparametric methods for roubust to estimate a location and scatter it is depending minimum covariance determinant of multivariate regression model , due to the presence of outliear values and increase the sample size and presence of more than after the model regression multivariate therefore be difficult to find a median location .
It has been the use of genetic algorithm Fast – MCD – Nested Extension and compared with neural Network Back Propagation of multilayer in terms of accuracy of the results and speed in finding median location ,while the best sample to be determined by relying on less distance (Mahalanobis distance)has the stu
... Show MoreCommunity detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo
... Show MoreGrass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.