Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-configuring mesh network in IoT sensor devices for better independent data collection quality. The research conducted in this paper is to build a mesh network using NodeMCU ESP 8266 and NodeMCU ESP 32 with two types of sensor, DHT 11 and DHT 22. Hence, the work here has evaluated on the delay performance metric in Line-of-Sight (LoS) and Non-Line-of-Sight (nLos) situation based on different network connectivity. The results give shorter delay time in LoS condition for all connected nodes as well as when any node fail to function in the mesh network compared to nLoS condition. The paper demonstrates that the IoT sensor devices composing the mesh network is a must to leverage the link communication performance for data collection in order to be used in IoT-based application such as fertigation system. It will certainly make a difference in the industry once being deployed on large scale in the IoT world and make the IoT more accessible to a wider audience.
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThe research problem stems from a chief question: “What is the nature of the responsibility that «Al-Sabah Al-Jadeed» and «Al-Mada» Newspapers have undertaken in promoting the values of citizenship and national belonging in the society? The research aims to achieve a number of goals, including: Determining the most prominent themes that were emphasized in the opinion articles in these two newspapers within the framework of the responsibility of promoting the values of citizenship and national belonging in society, and revealing the most prominent topics that were discussed in opinion articles in the two sample newspapers regarding the promotion of the mentioned values. This research is a desc
... Show MoreField experiment conducted to measured Slippage, Effective field capacity, Field Efficiency, Soil Volume Disturbed and Specific Productivity Tillage in silt clay loam soil with depth 18 cm in Baghdad- Iraq. Split – split plot design under randomized complete block design with three replications using Least Significant Design 5 % was used. Three factor used in this experiment included Two types of plows included Chisel and Disk plows which represented main plot , Three Tires Inflation Pressure was second factor included 1.1 ,1.8 and 2.7 Bar, and Three forward speeds of the tillage was third factor included 2.35 , 4.25 and 6.50 km/hr. Result show chisel plow recorded best parameters performance
This paper aims to discuss and analyse the role and importance of implementing industrial Policy to promote industry and enhance economic development in developing countries. The paper discusses the economic justifications for using industrial policy as well as the criticisms leveled against it, for this purpose it analyses the ideas of two different approaches to industrial policy. The first held by the neo-liberals in the USA , who oppose the use of industrial policy and emphasise the role of the market in attaining economic development. The second, represented by many economists who support the use of industrial policy to promote industry and accelerate economic development, they justify their stand by pointing to the negative
... Show MoreThe sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera
... Show MoreSurge pressure is supplemental pressure because of the movement of the pipes downward and the swab pressure is the pressure reduction as a result of the drill string's upward movement. Bottom hole pressure is reduced because of swabbing influence. An Investigation showed that the surge pressure has great importance for the circulation loss problem produced by unstable processes in the management pressure drilling (MPD) actions. Through Trip Margin there is an increase in the hydrostatic pressure of mud that compensates for the reduction of bottom pressure due to stop pumping and/or swabbing effect while pulling the pipe out of the hole. This overview shows suggested mathematical/numerical models for simulating surge pressure problems ins
... Show MoreObjective To investigate the accuracy of gingival crevicular fluid (GCF) E-cadherin and total antioxidant capacity (TAC) to discriminate periodontal health from disease. Subjects and Methods GCF samples were collected from participants with periodontal health (control), gingivitis, and periodontitis (n = 25 each group). The latter group was further subdivided according to stage (S) and grade. Periodontal parameters were recorded then levels of biomarkers were assayed using ELISA and antioxidant status by use of the Total Antioxidant Capacity Assay for E-cadherin and TAC, respectively. Results All periodontal parameters were significantly higher in periodontally diseased groups than controls. The GCF E-cadherin significantly increased
... Show More