The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial time by using the Benders decomposition technique and cutting plane approximation. To ensure the nonincreasing character of the Benders upper limit, a local branching method was also added to improve the convergence. Simulation results indicated that the proposed method is superior to the existing method and has better overall performance.
Massive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine
... Show MoreThis experiment was carried out at a private field in the eastern Radwaniyah Baghdad for the fall season 2020/2021 and spring 2021 to study the effects of adding mineral fertilizers, spraying salicylic acid and amino acids on some growth traits and yield of industrial potato plants. 200 kg N h-1 , 100 kg P2O5 h-1, 100 kg K2O h-1 and F2 consist of 275 kg N h-1, 180 kg P2O5 h-1, 200 K2O h-1 and F3 consist of 350 kg N h-1, 360 kg P2O5 h-1, 300 K2O h-1 and salicylic acid in three concentrations of 0,50 and 100 mg L-1 ( S1, S2, S3) and amino acids in three concentrations of 0, 1.25 and 2.5 ml L-1 ( A1, A2 , A3) It was carried out as a factorial split plot experiment, where the fertilizer levels (F1, F2 and F3) are in the main plot and th
... Show More The visual impression represents a compound process of a group of concepts that might be secondary and interrelated to constitute, in reality, a cognitive image stored in the memory that can be retrieved according the implications of the situation in which the individual lives in his environment, as it awakens in him an image from the sub consciousness, thus it gets stimulated, and it is among the tangible things.
Since we live in our contemporary world under the development of knowledge, micro and wide technology of the devices, tools, materials, mechanisms, current developments and openness… etc. this transformation created visual impressions that the individual in general and the consumer in specific enjoys concerning his
An Optimal Algorithm for HTML Page Building Process
Structural and optical properties were studied as a function of Nano membrane after prepared, for tests. Nano membrane was deposited by the spray coating method on substrates (glass) of thickness 100 mm. The X-ray diffraction spectra of (CNTs, WO3) were studied. AFM tests are good information about the roughness, It had been designed electrolysis cell and fuel cell. Studies have been performed on electrochemical parameters.
In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreDuring the winter, in the industry region (Shaikh Omer) and by applying a passive radon detector (CR-39), lung cancer risk has been measured in twelve rooms of different workshops of two old factories in this site. The radon concentration is ranged from (123.345 Bq/m3) to (328.985 Bq/m3) with an average of (244.19±61.52 Bq/m3). Lung cancer risk ranged from 55.993 to 149.346 per million people and with an average of (110.855 per million people) which were lower than the recommended values (170-230 per million people), so there was no cancer risk on workers in these locations.