Establishing coverage of the target sensing field and extending the network’s lifetime, together known as Coverage-lifetime is the key issue in wireless sensor networks (WSNs). Recent studies realize the important role of nature-inspired algorithms in handling coverage-lifetime problem with different optimization aspects. One of the main formulations is to define coverage-lifetime problem as a disjoint set covers problem. In this paper, we propose an evolutionary algorithm for solving coverage-lifetime problem as a disjoint set covers function. The main interest in this paper is to reflect both models of sensing: Boolean and probabilistic. Moreover, a heuristic operator is proposed as a local refinement operator to improve the quality of the solutions provided by the evolutionary algorithm. Simulation results show the necessity to inject a heuristic operator within the mechanism of evolutionary algorithm to improve its performance. Additionally, the results show performance difference while adopting the two types of sensing models.
Pseudomonas aeruginosa and Klebsiella pneumoniae appears good growth when replicate to culture with heavy crude oil. K. pneumoniae was less ability to biodegrade the heavy crude oil (66.22 wt.%) compare with P. aeruginosa 74 wt.%). Also the emulsion percent were about 64.8 % and 62.5 % for K. pneumoniae and P. aeruginosa, respectively. The results showed that the emulsions produced from both the strains decrease the surface tension of the media from 68.43 Mn/m (for control sample) to 44.50 and 43.30 Mn/m for P. aeruginosa and K. pneumoniae, respectively. The optimum temperature and pH for the hydrocarbons biodegradation were 28 ºC and 7, respectively. The incubation period of 28 days of the isolated increased hydrocarbons biodegradation
... Show MoreIn this paper, we procure the notions of neutrosophic simply b-open set, neutrosophic simply b-open cover, and neutrosophic simply b-compactness via neutrosophic topological spaces. Then, we establish some remarks, propositions, and theorems on neutrosophic simply
b-compactness. Further, we furnish some counter examples where the result fails.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreThe purpose of this study is to investigate the biostimulation effect of 532 nm CW laser on the metabolism of Saccharomyces cerevisiae yeast. Cells were irradiated by 532 nm Nd:YAG laser using 0.153 W/cm2 power density at 30, 45, 60,180 and 300 seconds exposure times in their respective orders. Intrafluorescence parameters were measured by detection the autofluorescence intensity, proliferation rate and Imaging the fluorescent mitochondria using confocal laser scanning microscope. The results showed that the 30 and 45 second exposure times seem to have stimulated changes in the cells that led to increase proliferation, viability and mitochondrial activity. Autofluorescence of cells increased after 45 and 60 seconds exposure time. After 3
... Show MoreThe main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isola
... Show MoreCurrently no one can deny the importance of data protection, especially with the proliferation of hackers and theft of personal information in all parts of the world .for these reasons the encryption has become one of the important fields in the protection of digital information.
This paper adopts a new image encryption method to overcome the obstacles to previous image encryption methods, where our method will be used Duffing map to shuffled all image pixels ,after that the resulting image will be divided into a group of blocks for perform the shuffling process via Cross Chaotic Map.
Finally, an image called key image was created by using Quadratic number spirals which will be used to generate nu
Luqman's story stated that human instinct, if I was brought up properly, reaches wisdom and inflicts the right to everything. It is to go to worship God and adhere to the satisfaction of morals and high morals that are ordered to meet among human beings in this life, because this worship educates in the soul the most beautiful morals needed by human beings of honesty, honesty and modesty, and the work of good and virtues, and distancing the soul from evil and vices.
In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q, this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo
... Show More