Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregation process. In this paper, we have highlighted the gains of the existing schemes for node clustering based data aggregation along with a detailed discussion on their advantages and issues that may degrade the performance. Also, the boundary issues in each type of clustering technique have been analyzed. Simulation results reveal that the efficacy and validity of these clustering-based data aggregation algorithms are limited to specific sensing situations only, while failing to exhibit adaptive behavior in various other environmental conditions.
When embankment is constructed on very soft soil, special construction methods are adopted. One of the techniques is a piled embankment. Piled (stone columns) embankments provide an economic and effective solution to the problem of constructing embankments over soft soils. This method can reduce settlements, construction time and cost. Stone columns provide an effective improvement method for soft soils under light structures such as rail or road embankments. The present work investigates the behavior of the embankment models resting on soft soil reinforced with stone columns. Model tests were performed with different spacing distances between stone columns and two lengths to diameter ratios of the stone columns, in addition to different
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreOur aim in this paper is to study the relationships between min-cs modules and some other known generalizations of cs-modules such as ECS-modules, P-extending modules and n-extending modules. Also we introduce and study the relationships between direct sum of mic-cs modules and mc-injectivity.
The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta
... Show MoreEach book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani
The aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.
Fusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t
... Show More- baumannii is an aerobic gram negative coccobacilli, it is considered multidrug resistance pathogen (MDR) and causes several infections that are difficult to treat. This study is aims to employ physical methods in sterilization and inactivation of A. baumannii, as an alternative way to reduce the using of drugs and antibiotics.
Cold Atmospheric Plasma was generated by one electrode at 20KV, 4 power supply and distance between electrode and sample was fixed on 1mm. A. baumannii (ATCC 19704 and HHR1) were exposed to Dielectric Barrier Discharge type of Cold Atmospheric Plasma (DBD-CAP) for several periods
Aging of asphalt pavements typically occurs through oxidation of the asphalt and evaporation of the lighter maltenes from the binder. The main objective of this study is to evaluate influence of aging on performance of asphalt paving materials.nAsphalt concrete mixtures, were prepared, and subjected to short term aging (STA) procedure which involved heating the loose mixtures in an oven for two aging period of (4 and 8) hours at a temperature of 135 o C. Then it was subject to Long term aging (LTA) procedure using (2 and 5) days aging periods at 85 o C for Marshall compacted specimens. The effect of aging periods on properties of asphalt concrete at optimum asphalt content such as Marshall Properties, indirect tensile strength at 25 o C,
... Show More