The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without considering the security elements which may cause malfunctioning and cyber-attacks. This study extended the experiments by testing the method in the presence of denial-of-service (DoS) attacks to investigate the efficiency of EEPCO in attack-based networks. The result shows EEPCO has poor performance in the presence of DoS attacks in terms of data gathering and energy efficiency, which then concludes that the EEPCO is vulnerable in attack-based networks.
many painters tried to mix colors with Music by direct employment through colorful musical pieces or the use of multiple instruments and techniques , or vice versa, including the French artist )Robert Stroben(, he transferred the piece of music to be depicted on the painting and worked on the tones of music (Johann Sebastian Bach) by dropping the color on the lines of the musical scale, for example (the C tone) ranging from brown to red ( Tone La A) from gray to orange, and so on, the presence of links and similarity factors between the world of music and the world of colors facilitated the process of linking musical notes with colors, the most famous of which was presented by the world (Newton) in the circle of basic colors and linking
... Show MoreAbstract Throughout this paper R represents commutative ring with identity and M is a unitary left R-module, the purpose of this paper is to study a new concept, (up to our knowledge), named St-closed submodules. It is stronger than the concept of closed submodules, where a submodule N of an R-module M is called St-closed (briefly N ≤Stc M) in M, if it has no proper semi-essential extensions in M, i.e if there exists a submodule K of M such that N is a semi-essential submodule of K then N = K. An ideal I of R is called St-closed if I is an St-closed R-submodule. Various properties of St-closed submodules are considered.
This paper offers a critical examination of Canadian news guidelines and policies
on user-generated content (UGC) posted on news-related comment sections and
social media.
The outline of how news-related UGC is moderated within Canadian news is achieved
by looking at the online comment policies of major Canadian news organizations like .
the CBC, CityNews (Halifax), CTV News, Glacier Media, Global News, The Globe
and Mail, Narcity Media, Postmedia, QUB (Québecor), and Torstar.The policies highlight how Canadian news organizations have practical strategies
to manage news-related UGC but also call upon positive and negative social
principles, to flag ill practices, foster democracy, and fight against online hate sp
Purpose: The purpose of this study was to clarify the basic dimensions, which seeks to indestructible scenarios practices within the organization, as a final result from the use of this philosophy.
Methodology: The methodology that focuses adoption researchers to study survey of major literature that dealt with this subject in order to provide a conceptual theoretical conception of scenarios theory .
The most prominent findings: The only successful formulation of scenarios, when you reach the decision-maker's mind wa takes aim to form a correct mental models, which appear in the expansion of Perception managers, and adopted as the basis of the decisions taken. The strength l
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
The present study was conducted to investigate the relationship between critical thinking, epistemological beliefs, and learning strategies with the academic performance of high school first-grade male and female students in Yazd. For this purpose, from among all first-grade students, as many as 250 students (130 females and 120 males) were selected by using multistage cluster sampling. The data needed were then collected through using California Critical Thinking Skills Test, Schommer's Epistemological Beliefs Questionnaire, Biggs’ Revised Two Factor Study Process Questionnaire. The findings indicated that there is a positive significant relationship between critical thinking and academic performance and achievement. Moreover, four fa
... Show MoreSubstantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreThis paper including a gravitational lens time delays study for a general family of lensing potentials, the popular singular isothermal elliptical potential (SIEP), and singular isothermal elliptical density distribution (SIED) but allows general angular structure. At first section there is an introduction for the selected observations from the gravitationally lensed systems. Then section two shows that the time delays for singular isothermal elliptical potential (SIEP) and singular isothermal elliptical density distributions (SIED) have a remarkably simple and elegant form, and that the result for Hubble constant estimations actually holds for a general family of potentials by combining the analytic results with data for the time dela
... Show MoreA study to find the optimum separators pressures of separation stations has been performed. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid is discharged from a higher-pressure separator into the lower-pressure separator. The set of working separator pressures that yields maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures, which is the target of this work.
A computer model is used to find the optimum separator pressures. The model employs the Peng-Robinson equation of state (Peng and Robinson 1976) for volatile oil. The application of t