This study reported the investigation of the Radio Frequency (RF) signal propagation of Global System for Mobile Communications (GSM) coverage in Emmanuel Alayande College of Education (EACOED), Oyo, Oyo State, Nigeria. The study aims at amplifying the quality of service and augment end users' sensitivity of the wireless services operation. The drive test method is adopted with estimation of coverage level and received signal strength. The Network Cell Info Lite application installed in three INFINIX GSM mobile phones was employed to take the measurement of the signal strength received from the transmitting stations of different mobile networks. The results of the study revealed that MTN has the maximum signal strength with a mean value of - 68.33 dBm, directly followed by Globacom (-80.41 dBm) and Airtel with -83.13 dBm. The Airtel signal has a conspicuously invariable poor performance with coverage level of 41.66 %. Conversely, the MTN and Globacom signal reception are observed to surpass the Airtel network within the college premises with 83.33 % and 60.41 % coverage level respectively. This implies that the signal quality for MTN and Globacom networks were comparatively disseminated within the college with inconsequential fluctuations in quality while Airtel signal is subsided and weaken. The poor performance in some areas was due to the presence of physical impediments and far distances location of base station antennas in the promulgation locations. This study therefore suggested that Airtel and Globacom Base Transceiver Stations (BTS) should be positioned within the college to improve good network reportage level.
To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading
... Show MoreNA Nasir, SHM Ali, HQMA AL-Ess, WA Hussein, MKW Al-Janabi, KIA Mohammed, JM Mosa, Euromediterranean Biomedical Journal, 2020
In this paper, effective slab width for the composite beams is investigated with special emphasis on the effect of web openings. A three dimensional finite element analysis, by using finite element code ANSYS, is employed to investigate shear lag phenomenon and the resulting effective slab width adopted in the classical T-beam approach. According to case studies and comparison with limitations and rules stipulated by different standards and codes of practice it is found that web openings presence and panel proportion are the most critical factors affecting effective slab width, whereas concrete slab thickness and steel beam depth are less significant. The presence of web opening reduces effective slab width by about 21%.
... Show MoreThe research aims to reveal the availability of skills to develop the tax assessor when carrying out the tax examination process. The study was conducted in the branches of the General Tax Authority in the province of Baghdad (the General Authority for Taxes, Adhamiya branch, the General Authority for Taxes, Rusafa branch, Al-Bayaa branch, New Baghdad tax branch) was approved The descriptive approach to achieve the research objectives represented by answering the following two questions: 1- What are the necessary skills that should be available in the performance of the tax examiner? 2- Are the skills of developing a tax evaluator available? The two researchers used the closed questionnaire as a tool for their research. The quest
... Show MoreAfter Hamdallah and his success on the realization of this manuscript (a letter in detail what was said in the parents of the Prophet Ibn Kamal Pasha (d. 940 e) study and investigation I will review some of the results reached in the realization of this manuscript:
1. The hadiths mentioned in this manuscript are mostly placed or weak.
2 - We are not entitled to speak about the silence of the law for saying Almighty ﭽ ﮮ ﮯ ﮰ ﮱ ﯓ ﯔ ﯕ ﯖ ﯗ ﯘ ﯙ ﭼ Table: 101.
3 in which harm to our Holy Prophet وله تع ﮂ ﮃ ﮄ ﮅ ﮆ ﮈ ﮉ ﮊ ﮋ ﮌ ﮍ ﮎ ﭼ parties: 57.
4 Because the parents of the Prophet of the people of the period ordered them to God for the Almighty ﭽ ﯨ ﯩ ﯪ ﯫ ﯬ
Smart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreIn this work, the study of corona domination in graphs is carried over which was initially proposed by G. Mahadevan et al. Let be a simple graph. A dominating set S of a graph is said to be a corona-dominating set if every vertex in is either a pendant vertex or a support vertex. The minimum cardinality among all corona-dominating sets is called the corona-domination number and is denoted by (i.e) . In this work, the exact value of the corona domination number for some specific types of graphs are given. Also, some results on the corona domination number for some classes of graphs are obtained and the method used in this paper is a well-known number theory concept with some modification this method can also be applied to obt
... Show More