In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonical definition for network lifetime in the IoT is to increase the period of cooperation between objects to carry out all the assigned tasks. The main contribution in this paper is to address the problem of task allocation in the IoT as an optimization problem with a lifetime-aware model. A genetic algorithm is proposed as a task allocation protocol. For the proposed algorithm, a problem-tailored individual representation and a modified uniform crossover are designed. Further, the individual initialization and perturbation operators (crossover and mutation) are designed so as to remedy the infeasibility of any solution located or reached by the proposed genetic algorithm. The results showed reasonable performance for the proposed genetic-based task allocation protocol. Further, the results prove the necessity for designing problem-specific operators instead of adopting the canonical counterparts.
Abstract
The current research aims to construct a scale for the nine types of students’ personality according to Rob Fitzel model. To do this, (162) items were formed that present the nine types of personality with (18) items for each type. To test the validity of the scale, a sample of (584) students of Al-Mustansrya University were chosen. The data of their responses was analyzed by using factor analysis. The findings explored (9) factors as one factor for each type of personality with (12) items for each one. Then, the reliability of the scale was found by using the test-retest method and Alfa Cronbach method.
Abstract
This research aims to analyze the reality of the production process in an assembly line Cars (RUNNA) in the public company for the automotive industry / Alexandria through the use of some Lean production tools, and data were collected through permanence in the company to identify the problems of the line in order to find appropriate to adopt some Lean production tools solutions, and results showed the presence of Lead time in some stations, which is reflected on the customer's waiting time to get the car, as well as some of the problems existing in the car produced such as high temperature of the car, as the company does not take into account customer preferences,
... Show MoreWind energy is becoming one of the renewable energy that has attracted great attention all over the world. This research work aims to build a map by which the user can have a thought about the number of generation hours of electricity from wind through all the year at the location of study (Wasit-Iraq). To interact the idea, this study included using the work included using different wind turbines at different heights. The results show that Gamesa G58-850 KW wind turbine gives more generated hours at 50 meters height.
Abstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, t
... Show MoreA hybrid particulate swarm optimization (hybrid) combination of an optimization algorithm of the particle swarm and a variable neighborhood search algorithm is proposed for the multi-objective permutation flow shop scheduling problem (PFSP) with the smallest cumulative completion time and the smallest total flow time. Algorithm for hybrid particulate swarm optimization (HPSO) is applied to maintain a fair combination of centralized search with decentralized search. The Nawaz-Enscore-Ham )NEH) heuristic algorithm in this hybrid algorithm is used to initialize populations in order to improve the efficiency of the initial solution. The method design is based on ascending order (ranked-order-value, ROV), applying the continuous PSO algorithm
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin
... Show MoreOptical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreBackground. Gene polymorphisms affect etanercept’s pharmacokinetics, pharmacodynamics, and side effects. This effect is evidenced by the extensive genetic variation in the drug’s targets. Objectives. This study aims to find the association between different genotypes of the promoter region of the TNF-α gene at -308G/A(rs1800629), -857C/T(rs1799724), -863 C/A(rs1800630), -1031 T/C (rs1799964), -806 C/T (rs4248158) and -376 G/A (rs1800750) and the side effects of ETN that occurred to Iraqi RA patients. Method. The trial included patients with rheumatoid arthritis who had been using ETN for at least six months. The participants were from the Baghdad Teaching Hospital Rheumatology Unit. The PCR was sequenced to determine the polymo
... Show MoreBootstrap is one of an important re-sampling technique which has given the attention of researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con
... Show More