Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-configuring mesh network in IoT sensor devices for better independent data collection quality. The research conducted in this paper is to build a mesh network using NodeMCU ESP 8266 and NodeMCU ESP 32 with two types of sensor, DHT 11 and DHT 22. Hence, the work here has evaluated on the delay performance metric in Line-of-Sight (LoS) and Non-Line-of-Sight (nLos) situation based on different network connectivity. The results give shorter delay time in LoS condition for all connected nodes as well as when any node fail to function in the mesh network compared to nLoS condition. The paper demonstrates that the IoT sensor devices composing the mesh network is a must to leverage the link communication performance for data collection in order to be used in IoT-based application such as fertigation system. It will certainly make a difference in the industry once being deployed on large scale in the IoT world and make the IoT more accessible to a wider audience.
A. chroococcum isolate was examined for its ability to produce the hydrolytic enzymes chitinase, pectinase, protease, and lipase, in an effort to enhance the growth of fava bean (Vicia faba). Biological experiment was conducted in pots with complete random design (CRD). The experiment includes three treatments: control (plant without treatment) (P), NPK fertilizer (plant + fertilizer) (PF), and A. chroococcum inoculum (plant + A. chroococcum) (PA). These treatments were performed with sterile and non-sterile soil, which were planted with fava beans. At the end of experiment (seven weeks from planting), length and weight of plant shoot and plant root were calculated. The results show that the isolate wa
... Show MoreThe fabrication of Solid and Hollow silver nanoparticles (Ag NPs) has been achieved and their characterization was performed using transmission electron microscopy (TEM), zeta potential, UV–VIS spectroscopy, and X-ray diffraction (XRD). A TEM image revealed a quasispherical form for both Solid and Hollow Ag NPs. The measurement of surface charge revealed that although Hollow Ag NPs have a zeta potential of -43 mV, Solid Ag NPs have a zeta potential of -33 mV. According to UV-VIS spectroscopy measurement Solid and Hollow Ag NPs both showed absorption peaks at wavelengths of 436 nm and 412 nm, respectively. XRD pattern demonstrates that the samples' crystal structure is cubic, similar to that of the bulk materials, with
... Show MoreThe makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in seve
... Show MoreCalcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively. The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA study of characteristics of the lubricant oils and the physical properties is essential to know the quality of lubricant oils. The parameters that lead to classify oils have been studied in this research. Three types of multi-grades lubricant oils were applied under changing temperatures from 25 oC to 78oC to estimate the physical properties and mixture compositions. Kinematic viscosity, viscosity gravity constant and paraffin (P), naphthenes (N) and aromatics (A) (PNA) analysis are used to predict the composition of lubricants oil. Kinematic viscosity gives good behaviors and the oxidation stability for each lubricant oils. PNA analysis predicted fractions of paraffin (XP), naphthenes (XN),
... Show MoreBioavailability is the objective for an optimum formulation. The target of the analysis is to maximize both the fluidity and disintegration profile of class II weakly compounds that are water-soluble. Anti-dyslipidemia drug rosuvastatin calcium (RC) (bioavailability 20%) through formulating as nanofibers (NFs) using electrospinning (ES) technology. Twenty formulas were prepared, and different polymers and polymer combinations with various concentrations were used such as polyethylene oxide (PEO) polyvinyl pyrrolidine (PVPK-30), and hydroxypropyl methylcellulose (HPMC). Three distinct groups of maximum parameters, including polymeric solution, electrospinning method, and ambient parameter, are capable of influencing the creation alon
... Show MoreIn this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show More