The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial time by using the Benders decomposition technique and cutting plane approximation. To ensure the nonincreasing character of the Benders upper limit, a local branching method was also added to improve the convergence. Simulation results indicated that the proposed method is superior to the existing method and has better overall performance.
Due to the urgent need to develop technologies for continuous glucose monitoring in diabetes individuals, poten tial research has been applied by invoking the microwave tech niques. Therefore, this work presents a novel technique based on a single port microwave circuit, antenna structure, based on Metamaterial (MTM) transmission line defected patch for sensing the blood glucose level in noninvasive process. For that, the proposed antenna is invoked to measure the blood glu cose through the field leakages penetrated to the human blood through the skin. The proposed sensor is constructed from a closed loop connected to an interdigital capacitor to magnify the electric field fringing at the patch center. The proposed an tenna sensor i
... Show MoreTransportation and distribution are the most important elements in the work system for any company, which are of great importance in the success of the chain work. Al-Rabee factory is one of the largest ice cream factories in Iraq and it is considered one of the most productive and diversified factories with products where its products cover most areas of the capital Baghdad, however, it lacks a distribution system based on scientific and mathematical methods to work in the transportation and distribution processes, moreover, these processes need a set of important data that cannot in any way be separated from the reality of fuzziness industrial environment in Iraq, which led to use the fuzzy sets theory to reduce the levels of uncertainty.
... Show MoreAbstract. In this paper, a high order extended state observer (HOESO) based a sliding mode control (SMC) is proposed for a flexible joint robot (FJR) system in the presence of time varying external disturbance. A composite controller is integrated the merits of both HOESO and SMC to enhance the tracking performance of FJR system under the time varying and fast lumped disturbance. First, the HOESO estimator is constructed based on only one measured state to precisely estimate unknown system states and lumped disturbance with its high order derivatives in the FJR system. Second, the SMC scheme is designed based on such accurate estimations to govern the nominal FJR system by well compensating the estimation errors in the states and the lumped
... Show MoreThe present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method.
This Study· is to investigate the Visceral LeishmaniEJ,sis among 8
susp<:;cted infants and young chUdren admitted 1o AI-Khadhtmiya
Pediatric Hospital in Baghdad between January 1,2005 o August
31,2005 .For each patieni, a medical history was obtained and a complete physical examination was performed by physicians . The serums of the .suspected c_es were primarily diagnosed by using a new ,simple diagnostic method bas.ed on detecting antib9dies against the recombinant K 39
... Show MoreBackground: Gliomas are brain tumours of supporting tissue of the brain. The management of low grade glioma is still a great debate ranges from just follow up to extensive surgery followed by DXT, with or without chemothery.
Patients and Methods: 282 patients taken from neuro-surgical hospital between 1980-1990, divided to 3 groups with different modality of management & follow up for 15 years.
Results: the five years survival and symptomatic improvement was higher in the group managed by extensive surgery and DXT with or without cytoxic drugs followed by group managed by biopsy and DXT with or without cytoxic.
Conclusion: management of low grade glioma symptoms & out come (survival) is best by extensive surgery & DX
In this work, we introduce a new convergence formula. We also define cluster point , δ-Cauchy sequence, δ-convergent, δ-completeness , and define sequentially contraction in approach space. In addition, we prove the contraction condition is necessary and sufficient to get the function is sequentially contraction as well as we put a new structure for the norm in the approach space which is called approach –Banach space, we discuss the normed approach space with uniform condition is a Hausdorff space. Also, we prove a normed approach space is complete if and only if the metric generated from approach space is complete as well as prove every finite –dimensional approach normed space is δ-complete. We prove several r
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show More