The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without considering the security elements which may cause malfunctioning and cyber-attacks. This study extended the experiments by testing the method in the presence of denial-of-service (DoS) attacks to investigate the efficiency of EEPCO in attack-based networks. The result shows EEPCO has poor performance in the presence of DoS attacks in terms of data gathering and energy efficiency, which then concludes that the EEPCO is vulnerable in attack-based networks.
Two field experiments were carried out for cultivating yellow maize crop Zea mays L. during the autumn planting season 2019 in two sites with soils of different textures. The first site is a loamy texture in one of the fields of the Medhatia Agriculture Division, Babylon Governorate. The second was silty loam by an alluvial mixture in one of the fields of Al-Nouriah Research Station, Ministry of Agriculture located in Al-Nouriah sub-district, Al-Qadisiyah governorate. It was found through the results that the uniformity, efficiency, and adequacy of the irrigation efficiency of the sprinkler irrigation method is better than that of the sprinkler irrigation method, and it ranged between (88.6-88.7) for uniformity and (84-86)% of the irrigatio
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreA method was developed that offers a rapid, simple and accurate technique for the determination of chlorophenols at trace levels in aqueous samples with very limited volumes of organic solvents. These compounds were acetylated, then preliminarily extracted with n-hexane. The enriched chlorophenols were directly analyzed using gas chromatography with an electron-capture detector. The detection limits were in the range of 0.001–0.005 mg/L, except for 2-chlorophenol, which was always above 0.013 mg/L. Relative standard deviation for the spiked water samples ranged from 2.2 to 6.1%, while relative recoveries were in the range of 67.1 to 101.3%.
Aim of the present study is Identification of specific gene for GPCR using specific primers .and identification of difference in PCR analysis in patients with heart thrombosis and compared with healthy, Sequencing of PCR product regarding GPCR compared for all three subject, Identification the similarity of human GPCR with local strain of yeast fifty healthy control and fifty patients with thrombosis which diagnosed medically with cardiac specific troponin t, troponin 1 levels and electro myocardiogram ECG. The aged for all subjects ranged (39-75) years patients were lying in cardiac care unit at Ibn- al- Nafees teaching hospital and Sheikh Zayed teaching hospital. Genomic DNA of whole blood was extracted from buffy coat and cell cu
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreIn this research, we studied the effect of concentration carriers on the efficiency of the N749-TiO2 heterogeneous solar cell based on quantum electron transfer theory using a donor-acceptor scenario. The photoelectric properties of the N749-TiO2 interfaces in dye sensitized solar cells DSSCs are calculated using the J-V curves. For the (CH3)3COH solvent, the N749-TiO2 heterogeneous solar cell shows that the concentration carrier together with the strength coupling are the main factors affecting the current density, fill factor and efficiency. The current density and current increase as the concentration increases and the
With the recent growth of global populations, main roads in cities have witnessed an evident increase in the number of vehicles. This has led to unprecedented challenges for authorities in managing the traffic of ambulance vehicles to provide medical services in emergency cases. Despite the high technologies associated with medical tracks and advanced traffic management systems, there is still a current delay in ambulances’ attendance in times of emergency to provide patients with vital aid. Therefore, it is indispensable to introduce a new emergency service system that enables the ambulance to reach the patient in the least congested and shortest paths. However, designing an effici
The aim of the research is to show the importance of international auditing standards and the effect of this in reducing the incidence of financial irregularities in government service units and how to address them. The research adopted the descriptive, analytical and inductive approaches. In the analytical approach, a questionnaire model was designed and distributed to internal auditors in some of the subordinate government units. For the Ministry of Health, appropriate statistical methods were used that showed the extent of the general understanding of the internal auditor’s relationship with international standards and the impact of this on preserving public money and the role of the internal auditor in detecting financial irregulariti
... Show MoreThat the essential contribution of this research is a description of how complex systems analysis service of the properties of the queue in Baghdad Teaching Hospital using a technique network is techniques method (Q - GERT) an acronym of the words:
Queuing theory _ Graphical Evaluation and Review Technique
Any method of assessment and review chart where you will be see the movement flow of patients within the system and after using this portal will be represented system in the form of planned network probabilistic analysis and knowledge of statistical distributions appropriate for times of arrival and departure were using the program ready (Win QSB) and simulatio
... Show More