Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregation process. In this paper, we have highlighted the gains of the existing schemes for node clustering based data aggregation along with a detailed discussion on their advantages and issues that may degrade the performance. Also, the boundary issues in each type of clustering technique have been analyzed. Simulation results reveal that the efficacy and validity of these clustering-based data aggregation algorithms are limited to specific sensing situations only, while failing to exhibit adaptive behavior in various other environmental conditions.
Urban wetlands are one of the complex systems that provide many economic, social and environmental services to the city. In this research, the most important services provided by urban wetlands from the point of view of the urban planner were reviewed, and the types of these lands and their divisions according to the type of services provided by each type were presented. Environmental is represented in its ability to reduce the dangers of floods, mitigate the climate and reduce its negative impacts, purify water and deplete a lot of suspended impurities and pollutants, and social services such as recreational areas and beautiful landscapes that inspire joy and reassurance in the soul, as well as cultural areas and sports activities for m
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreOur aim in this paper is to study the relationships between min-cs modules and some other known generalizations of cs-modules such as ECS-modules, P-extending modules and n-extending modules. Also we introduce and study the relationships between direct sum of mic-cs modules and mc-injectivity.
The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta
... Show MoreEach book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani
The aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.
The goal of this research is to introduce the concepts of Large-small submodule and Large-hollow module and some properties of them are considered, such that a proper submodule N of an R-module M is said to be Large-small submodule, if N + K = M where K be a submodule of M, then K is essential submodule of M ( K ≤e M ). An R-module M is called Large-hollow module if every proper submodule of M is Large-small submodule in M.