The rapid evolution of wireless networking technologies opens the door to the evolution of the Wireless Sensor Networks (WSNs) and their applications in different fields. The WSN consists of small energy sensor nodes used in a harsh environment. The energy needed to communicate between the sensors networks can be identified as one of the major challenges. It is essential to avoid massive loss, or loss of packets, as well as rapid energy depletion and grid injustice, which lead to lower node efficiency and higher packet delivery delays. For this purpose, it was very important to track the usage of energy by nodes in order to improve general network efficiency by the use of intelligent methods to reduce the energy used to extend the life of the WSN and take successful routing decisions. For these reasons, designing an energy-efficient system that utilizes intelligent approaches is considered as the most powerful way to prolong the lifetime of the WSN. The proposed system is divided into four phases (sensor deployment phase, clustering phase, intra-cluster phase, and inter-cluster phase). Each of these phases uses a different intelligent algorithm with some enhancements. The performance of the proposed system was analyzed and evaluations were elaborated with well-known existing routing protocols. To assess the proficiency of the proposed system and evaluate the endurance of the network, efficiency parameters such as network lifetime, energy consumption, and packet delivery to the Sink (Base station) were exploited. The experimental outcomes justify that the proposed system surpasses the existing mechanisms by 50%.
The entrance process re-engineering one of the main entrances of administrative and technology appropriate to keep pace with scientific progress and the continuing changes in business environment and for the purpose of achieving the goal sought by the organizations in the pursuit of rapid developments and renewable energy in the market competition by changing its operations and activities of the radical change which contributes to an effective contribution to reducing the cost of product or service taking into account the quality improvement in the management of change to keep the increase value and speed of placing on the market to meet customer needs and desires to achieve a
... Show MoreIn this paper simulation technique plays a vital role to compare between two approaches Maximum Likelihood method and Developed Least Square method to estimate the parameters of Frechet Poisson Lindley Distribution Compound. by coding using Matlab software program. Also, under different sample sizes via mean square error. As the results which obtain that Maximum Likelihood Estimation method is better than Developed Least Square method to estimate these parameters to the proposed distribution.
The primary function of commercial banks is the process of converting liquid liabilities such as deposits to illiquid assets, (also known as a loan), liquid assets, (aka cash and cash equivalent) in a balanced manner between liquid and illiquid assets, that guaranteed the preservation of the rights of depositors and the bank and not by converting liquid liabilities into liquid assets in a very large percentage. This comes from its role as depository and intermediary institutions between supply and demand, therefore, we find that the high indicators of bank liquidity and solvency may reflect a misleading picture of the status of commercial banks, to some extent in terms of the strength of their balance sheets and
... Show MoreA key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori
... Show MoreIn this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.
The research aims to verify the role of the Human Resources Strategic Management (HRSM) in enhancing the strategic success factors for talent (SSFT) in the General Tourism Authority by distributing a questionnaire consisting of (36) paragraphs on an intentional sample represented by the higher departments as it reached (50) and the sample valid for testing was (44) Person and to test the relationships between the two research variables, the researchers used statistical methods represented by (Bartlett test / mean / simple regression coefficient / difference coefficient, alpha- cronbachAch, confirmatory factor Analysis ) through the statistical program (SPSS v.23 & AMOS v.23). In enhancing the factors of success for talent management in the
... Show MoreThe study aims to identify the degree of Tabuk University practices to raise the intellectual awareness of students through scientific research, as well as to identify the degree of Tabuk University practicing to raise the intellectual awareness through the educational process (faculty member – activities). The study also seeks to identify the degree of Tabuk University practicing to raise the intellectual awareness of students through community service and university media. The study is descriptive in nature that employed the questionnaire as a tool in collecting data. Total of (540) students were chosen randomly from different colleges at universities of Tabuk to form the study sample. The results showed that faculty member has pract
... Show More