The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without considering the security elements which may cause malfunctioning and cyber-attacks. This study extended the experiments by testing the method in the presence of denial-of-service (DoS) attacks to investigate the efficiency of EEPCO in attack-based networks. The result shows EEPCO has poor performance in the presence of DoS attacks in terms of data gathering and energy efficiency, which then concludes that the EEPCO is vulnerable in attack-based networks.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has
... Show MoreA model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga
... Show MoreObjectives: The purpose of this in vitro study was to compare the effect of adding a poloxamer surfactant to the irrigant solutions on its cleaning efficiency. Design: In this study the roots of extracted permanent premolar teeth were used and evaluated by using Scanning Electronic Microscopy (SEM). Materials and Method: 72 human single tooth of permanent premolar (8 for each group) were used in this in vitro study. Roots after sectioning at cervical area to get 15 mm were embedded in a plastic container filled with impression silicon, then instrumented with ProTaper rotary instruments till size F4. Each group (8 root) were irrigated with one of the nine solutions used in study: three concentrations of NaOH [5% (A1), 2.5%(A2), 0.5%(A3)], th
... Show MoreA theoretical model is developed to determine time evolution of temperature at the surface of an opaque target placed in air for cases characterized by the formation of laser supported absorption waves (LSAW) plasmas. The model takes into account both plasma dynamics and time variation of incident laser pulse (i.e. pulse shape or profile).Shock tube relations were employed in formulating plasma dynamics over target surface. Gaussian function was chosen in formulating the pulse profile in the present modeling
Background: Fertility plays great role in animal reproduction since high quality semen improves sheep industry reproduction. The current worldwide data revealed the closely related of CNP to reproductive function of rams. Aims: Evaluation the effect of CNP on cooled sperms using the traditional and molecular assays. Methods: Totally, 20 testicular samples were collected, processed to obtain the semen samples and divided into two parts; one treated with the suitable dose of CNP and the otherserved as a control. Sperm samples of both groups were cooled for 3 days and tested at 0 0h, 24h, 48h and 72h. Results: The findings revealed that the suitable dose of CNP-treated sperms was 0.0110-13. Values individual motility, live sperm
... Show More