Zigbee, which has the standard IEEE 802.15.4. It is advisable method to build wireless personal area network (WPAN) which demands a low power consumption that can be produced by Zigbee technique. Our paper gives measuring efficiency of Zigbee involving the Physical Layer (PL) and Media Access Control (MAC) sub-layer , which allow a simple interaction between the sensors. We model and simulate two different scenarios, in the first one, we tested the topological characteristics and performance of the IEEE802.15.4 standard in terms of throughput, node to node delay and figure of routers for three network layouts (Star, Mesh and Cluster Tree) using OPNET simulator. The second scenario investigates the self-healing feature on a mesh topology from earlier design until it supports a large number of end points (>64,000) with dynamic routing. The self-healing is done by removing a router from the network during operation, and seeing the end devices find an alternate path to communicate with the coordinator.
This study delves into the realm of advanced cooling techniques by examining the performance of a two-stage parallel flow indirect evaporative cooling system enhanced with aspen pads in the challenging climate of Baghdad. The objective was to achieve average air dry bulb temperatures (43 oC) below the ambient wet bulb temperatures (24.95 oC) with an average relative humidity of 23%, aiming for unparalleled cooling efficiency. The research experiment was carried out in the urban environment of Baghdad, characterized by high temperature conditions. The investigation focused on the potential of the two-stage parallel flow setup, combined with the cooling capability of aspen pads, to surpass the limitat
... Show MoreThis study was prepared to investigate the performance and behavior of concrete thrust blocks supporting pipe fittings. In the water distribution networks, it is always necessary to change the path of the pipes at different degrees or to create new branches. In these regions, an unbalanced force called the thrust force is generated. In order to counter this force, these regions are supported with concrete blocks. In this article, the system components (soil, pipe with its bend and thrust blocks) have been numerically modeled and simulated by the ABAQUS CAE/2019 software program in order to study the behavior and stability of the thrust block with different burial conditions (several b
Photovoltaic (PV) devices are widely used renewable energy resources and have been increasingly manufactured by many firms and trademarks. This condition makes the selection of right product difficult and requires the development of a fast, accurate and easy setup that can be implemented to test available samples and select the cost effective, efficient, and reliable product for implementation. An automated test setup for PV panels using LabVIEW and several microcontroller-based embedded systems were designed, tested, and implemented. This PV testing system was fully automated, where the only human intervention required was the instalment of PV panel and set up of required testing conditions. The designed and implemented system was
... Show MoreA simple, low cost and rapid flow injection turbidimetric method was developed and validated for mebeverine hydrochloride (MBH) determination in pharmaceutical preparations. The developed method is based on forming of a white, turbid ion-pair product as a result of a reaction between the MBH and sodium persulfate in a closed flow injection system where the sodium persulfate is used as precipitation reagent. The turbidity of the formed complex was measured at the detection angle of 180° (attenuated detection) using NAG dual&Solo (0-180°) detector which contained dual detections zones (i.e., measuring cells 1 & 2). The increase in the turbidity of the complex was directly proportional to the increase of the MBH concentration
... Show MoreCorrosion experiments were carried out to investigate the effect of several operating parameters on the corrosion rate and corrosion potential of carbon steel in turbulent flow conditions in the absence and presence of sodium benzoate inhibitor using electrochemical polarization technique. These parameters were rotational velocity (0 - 1.57 m/s), temperature (30oC – 50oC), and time. The effect of these parameters on the corrosion rate and inhibition efficiency were investigated and discussed. It was found that the corrosion rate represented by limiting current increases considerably with increasing velocity and temperature and that it decreased with time due to the formation of corrosion product layer. The corrosion potential shifted t
... Show MoreRecently, wireless communication environments with high speeds and low complexity have become increasingly essential. Free-space optics (FSO) has emerged as a promising solution for providing direct connections between devices in such high-spectrum wireless setups. However, FSO communications are susceptible to weather-induced signal fluctuations, leading to fading and signal weakness at the receiver. To mitigate the effects of these challenges, several mathematical models have been proposed to describe the transition from weak to strong atmospheric turbulence, including Rayleigh, lognormal, Málaga, Nakagami-m, K-distribution, Weibull, Negative-Exponential, Inverse-Gaussian, G-G, and Fisher-Snedecor F distributions. This paper extensive
... Show MoreAbstract
Zigbee is considered to be one of the wireless sensor networks (WSNs) designed for short-range communications applications. It follows IEEE 802.15.4 specifications that aim to design networks with lowest cost and power consuming in addition to the minimum possible data rate. In this paper, a transmitter Zigbee system is designed based on PHY layer specifications of this standard. The modulation technique applied in this design is the offset quadrature phase shift keying (OQPSK) with half sine pulse-shaping for achieving a minimum possible amount of phase transitions. In addition, the applied spreading technique is direct sequence spread spectrum (DSSS) technique, which has
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreThe strong cryptography employed by PGP (Pretty Good Privacy) is one of the best available today. The PGP protocol is a hybrid cryptosystem that combines some of the best features of both conventional and public-key cryptography. This paper aim to improve PGP protocol by combined between the Random Genetic algorithm, NTRU (N-th degree Truncated polynomial Ring Unit) algorithm with PGP protocol stages in order to increase PGP protocol speed, security, and make it more difficult in front of the counterfeiter. This can be achieved by use the Genetic algorithm that only generates the keys according to the Random Genetic equations. The final keys that obtained from Genetic algorithm were observed to be purely random (according to the randomne
... Show More