The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without considering the security elements which may cause malfunctioning and cyber-attacks. This study extended the experiments by testing the method in the presence of denial-of-service (DoS) attacks to investigate the efficiency of EEPCO in attack-based networks. The result shows EEPCO has poor performance in the presence of DoS attacks in terms of data gathering and energy efficiency, which then concludes that the EEPCO is vulnerable in attack-based networks.
Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh
... Show MoreIn pre- Islamic poetry, there are a lot of words that indicate
peacefulness of one sort of another, in addition to the inspirations of semantic
modeling in which the poet sets himself in various horizons.
Among these words: brother, comrade, friend, companion, lover,
people, prince, home, land, country, blessing, honesty, contract, company,
justice, thankfulness, forgiveness, pardoning, guest, goodness, faithfulness,
silence, death, peace,….
In addition, there are their derivatives from various aspects that indicate
peacefulness either directly or indirectly.
يهدف البحث إلى دراسة التحفظات على اتفاقية سيداو (الدول العربية أنموذجًا)، حيث يُعد نظام التحفظ على الاتفاقيات الدولية أحد المظاهر القانونية الحديثة في مجال العلاقات الدولية، والذي يقرّ بحق الدول في إبداء التحفظ على بعض أحكام الاتفاقيات الدولية، وفقًا للأحكام العامة التي حددتها المواد (19-23) من اتفاقية فيينا لقانون المعاهدات لعام 1969. وإذا كان حق الدول في التحفظ مكفولًا دوليًا، فإن الإشكالية القانونية تكمن في
... Show MoreIn this research the subject of human ability to change, as it is proven in the Koran , which is proof of the argument against the ability of human change , whether the change in the positive or negative direction .
Here the limits of the research are limited to a study of analysis of human ability to change and this establishes the important of knowing that man has the ability while in the wrong way to change the path to the right path which Gifts and guidance .
The search required three demands and conclusion
- The first required :- is to try the idolaters to take out believers by right .
- The second required :- is to change what is inside the soul as a reason to enter blessings on man .
- The third required :- is good
The aim of the current research is to explore the health, psychological, and social implications of Internet addiction. Internet addiction is a new type of addiction, which negatively affects an individual’s life and creates social problems, psychological and nervous disorders. The research is divided into three sections: The first section is devoted to the definition of the research and includes the research problem, its importance in addition to the objectives, and the search terms were defined in it. The second section included the concept of addiction on the Internet and the causes, symptoms of addiction, forms, and previous studies were reviewed. As for the third topic, it deals with the theories explaining Internet addiction and
... Show MoreResearch revealed the most important things:
1 - that the sentence if the nominal manufacturing according to one of the main frames for the construction of the original sentence or the nucleus called the obstetric and called the nominal or actual.
2 - is not an element of denial. Some of them counted in the Acts the people of Basra are missing and some of them are counted conjunction Menem people of Kufa and promise of the tools of the exception and some of them promise to benefit neglected exile is not Flaaml have at this team.
- What precluding it have a characteristic which they enter the actual sentence and never let an impact on the act, and the intervention of the nominal sentence Fathol