The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming model (MILP) and then we used a heuristic to solve the time complexity problem. The results obtained in the simulation results indicate the optimal performance of the proposed scheme in terms of energy consumption and the number of used UAVs.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreIn data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Cloud-based Electronic Health Records (EHRs) have seen a substantial increase in usage in recent years, especially for remote patient monitoring. Researchers are interested in investigating the use of Healthcare 4.0 in smart cities. This involves using Internet of Things (IoT) devices and cloud computing to remotely access medical processes. Healthcare 4.0 focuses on the systematic gathering, merging, transmission, sharing, and retention of medical information at regular intervals. Protecting the confidential and private information of patients presents several challenges in terms of thwarting illegal intrusion by hackers. Therefore, it is essential to prioritize the protection of patient medical data that is stored, accessed, and shared on
... Show MorePurpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreA total of 45 voucher specimens of falcons which are deposited in the bird's collection of the Iraq Natural History Research Center and Museum (INHM) were reviewed. Mummified falcons were preserved as voucher study specimens and tagged with museum collection labels. In the current study, morphometrics of six species of the genus Falco Linnaeus, 1758: Lanner falcon F. biarmicus Temminck, 1825; Sacker Falcon F. cherrug Gray, 1834; Lesser Kestrel F. naumanni Fleischer, 1818; Peregrine Falcon F. peregrines Tunstall, 1771; Eurasian Hobby F. subbuteo Linnaeus, 1758 and Common Kestrel F. tinnunculus Linnaeus, 1758 were documented. These species were recorded previously in the ornithological literatures by several authors and deposited in t
... Show MoreA total of 45 voucher specimens of falcons which are deposited in the bird's collection of the Iraq Natural History Research Center and Museum (INHM) were reviewed. Mummified falcons were preserved as voucher study specimens and tagged with museum collection labels. In the current study, morphometrics of six species of the genus Falco Linnaeus, 1758: Lanner falcon F. biarmicus Temminck, 1825; Sacker Falcon F. cherrug Gray, 1834; Lesser Kestrel F. naumanni Fleischer, 1818; Peregrine Falcon F. peregrines Tunstall, 1771; Eurasian Hobby F. subbuteo Linnaeus, 1758 and Common Kestrel F. tinnunculus Linnaeus, 1758 were documented. These species were recorded previously in the ornithological literatures by several authors and deposited in t
... Show MoreA total of 45 voucher specimens of falcons which are deposited in the bird's collection of the Iraq Natural History Research Center and Museum (INHM) were reviewed. Mummified falcons were preserved as voucher study specimens and tagged with museum collection labels. In the current study, morphometrics of six species of the genus Falco Linnaeus, 1758: Lanner falcon F. biarmicus Temminck, 1825; Sacker Falcon F. cherrug Gray, 1834; Lesser Kestrel F. naumanni Fleischer, 1818; Peregrine Falcon F. peregrines Tunstall, 1771; Eurasian Hobby F. subbuteo Linnaeus, 1758 and Common Kestrel F. tinnunculus Linnaeus, 1758 were documented.
These species were recorded previously in the ornithological literatures by several authors and deposited in the
In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
In cognitive radio networks, there are two important probabilities; the first probability is important to primary users called probability of detection as it indicates their protection level from secondary users, and the second probability is important to the secondary users called probability of false alarm which is used for determining their using of unoccupied channel. Cooperation sensing can improve the probabilities of detection and false alarm. A new approach of determine optimal value for these probabilities, is supposed and considered to face multi secondary users through discovering an optimal threshold value for each unique detection curve then jointly find the optimal thresholds. To get the aggregated throughput over transmission
... Show More