Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the sensor data readings, after which a lossless LZW compression to compress the loss quantization output. Quantizing the sensor node data readings down to the alphabet size of SAX results in lowering, to the advantage of the best compression sizes, which contributes to greater compression from the LZW end of things. Also, another improvement was suggested to the CBDR technique which is to add a Dynamic Transmission (DT-CBDR) to decrease both the total number of data sent to the gateway and the processing required. OMNeT++ simulator along with real sensory data gathered at Intel Lab is used to show the performance of the proposed technique. The simulation experiments illustrate that the proposed CBDR technique provides better performance than the other techniques in the literature.
Density Functional Theory (DFT) calculations were carried out to study the thermal cracking for acenaphthylene molecule to estimate the bond energies for breaking C8b-C5a , C5a-C5 , C5-C4 , and C5-H5 bonds as well as the activation energies. It was found that for C8b-C5a , C5-C4 , and C5-H5 reactions it is often possible to identify one pathway for bond breakage through the singlet or triplet states. The atomic charges , dipole moment and nuclear – nuclear repulsion energy supported the breakage bond .Also, it was found that the activation energy value for C5-H5 bond breakage is lower than that required for C8b-C5a , C5a-C5 , C5-C4 bonds which refer to C5-H5 bond in acenaphthylene molecule are weaker than C8b-C5a , C5a-C5 , C5-C
... Show More
Viscosity is one of the most important governing parameters of the fluid flow, either in the porous media or in pipelines. So it is important to use an accurate method to calculate the oil viscosity at various operating conditions. In the literature, several empirical correlations have been proposed for predicting crude oil viscosity. However, these correlations are limited to predict the oil viscosity at specified conditions. In the present work, an extensive experimental data of oil viscosities collected from different samples of Iraqi oil reservoirs was applied to develop a new correlation to calculate the oil viscosity at various operating conditions either for dead, satura
... Show MoreThe seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.
Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.
The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple
... Show MoreObjective: The study aimed to determine quality of life domains for adult patients with limbs loss and to identify
the association between quality of life domains and demographic characteristics and medical information.
Methodology: A descriptive study was carried out at Baghdad artificial limb center, Al-Salam medical
rehabilitation center, Al-Ghadeer medical rehabilitation center and the rheumatoid and medical rehabilitation
center for the period from September 2007 to April 2008. A purposive ''non- probability'' sample of (200)
patients with limbs loss. Questionnaire form was constructed for the purpose of the study. Data were collected
through the application of the questionnaire and interview technique. Data were a
The current research dealt with the rapid development of industrial product design in recent times, and this development in the field of design led to the emergence of modern trends in many terms and theories to direct greater interest in the cognitive foundations of design and its relationship with the components of other natural sciences, and despite the impressive technological development, nature remains With its content of formative values and structural dimensions, it is the first source of inspiration and the source of all modern mathematical sciences and theories, as God made them tend towards organization to continue to provide us with endless inspiration. Hence, the fractional one, which is an important part of dedicating the d
... Show MoreBlogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the p
... Show MoreStudents in the twenty-first century need to find innovative ways to satisfy and respond to these learning requirements since they live in a visible world that is continuously surrounded by visual, technological stimuli. This is especially true of higher education. In order promote advancements in sustainable awareness, the project aims to include visual understanding in education (VUE) in higher education communication skills. An interview has been employed as a tool to accomplish the study's goal. The idea of Visual Understanding in Education (VUE) is one of the many novel or modern ways that has produced remarkable outcomes in a wide range of specialized sectors. Teachers may spread lessons of responsibility and consciousness by being aw
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show More