Establishing complete and reliable coverage for a long time-span is a crucial issue in densely surveillance wireless sensor networks (WSNs). Many scheduling algorithms have been proposed to model the problem as a maximum disjoint set covers (DSC) problem. The goal of DSC based algorithms is to schedule sensors into several disjoint subsets. One subset is assigned to be active, whereas, all remaining subsets are set to sleep. An extension to the maximum disjoint set covers problem has also been addressed in literature to allow for more advance sensors to adjust their sensing range. The problem, then, is extended to finding maximum number of overlapped set covers. Unlike all related works which concern with the disc sensing model, the contribution of this paper is to reformulate the maximum overlapped set covers problem to handle the probabilistic sensing model. The problem is addressed as a multi-objective optimization (MOO) problem and the well-known decomposition based multi-objective evolutionary algorithm (MOEA/D) is adopted to solve the stated problem. A Multi-layer MOEA/D is suggested, wherein each layer yields a distinct set cover. Performance evaluations in terms of total number of set covers, total residual energy, and coverage reliability are reported through extensive simulations. The main aspect of the results reveals that the network's lifetime (i.e. total number of set covers) can be extended by increasing number of sensors. On the other hand, the coverage reliability can be increased by increasing sensing ranges but at the expense of decreasing the network's lifetime.
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreIn this article, we investigate a mathematical fractional model of tuberculosis that takes into account vaccination as a possible way to treat the disease. We use an in-host tuberculosis fractional model that shows how Macrophages and Mycobacterium tuberculosis interact to knowledge of how vaccination treatments affect macrophages that have not been infected. The existence of optimal control is proven. The Hamiltonian function and the maximum principle of the Pontryagin are used to describe the optimal control. In addition, we use the theory of optimal control to develop an algorithm that leads to choosing the best vaccination plan. The best numerical solutions have been discovered using the forward and backward fractional Euler
... Show MoreMany carbonate reservoirs in the world show a tilted in originally oil-water contact (OOWC) which requires a special consideration in the selection of the capillary pressure curves and an understanding of reservoir fluids distribution while initializing the reservoir simulation models.
An analytical model for predicting the capillary pressure across the interface that separates two immiscible fluids was derived from reservoir pressure transient analysis. The model reflected the entire interaction between the reservoir-aquifer fluids and rock properties measured under downhole reservoir conditions.
This model retained the natural coupling of oil reservoirs with the aquifer zone and treated them as an explicit-region composite system
Background: The first and second choice for vascular access in patients with end stage renal disease (ESRD) is radio cephalic and brachio cephalic arteriovenous fistula (AVF).In patients with failed previous AVF e or poorly visualized or impalpable cephalic veins, the basilic vein can be mobilized and superficialized to create an AVF with the brachial artery.Objective: The aim of this study is to report our experience at the Vascular Surgery Department/ Surgical Specialty Hospital in brachio-basilic (BB) vascular access for hemodialysis.Methods: From January 2006 to December 2009, 31 patients with ESRD whose cephalic veins were thrombosed or impalpable or had previous unsuccessful vascular access procedures were referred to the Vascular
... Show MoreThe nature of the dark sector of the Universe remains one of the outstanding problems in modern cosmology, with the search for new observational probes guiding the development of the next generation of observational facilities. Clues come from tension between the predictions from Λ cold dark matter (ΛCDM) and observations of gravitationally lensed galaxies. Previous studies showed that galaxy clusters in the ΛCDM are not strong enough to reproduce the observed number of lensed arcs. This work aims to constrain the warm dark matter (WDM) cosmologies by means of the lensing efficiency of galaxy clusters drawn from these alternative models. The lensing characteristics of two samples of simulated clusters in the Λ warm dark matter and ΛCDM
... Show MoreIn this study asparaginase was extracted from fruit part of Capiscum annum then Asparaginase activity was detected and optimised. Optimum conditions for the activity of crude asparaginase were studied. Results showed maximum activity of asparaginase was achieved 140 u/ml when the enzyme was incubated with 200 mM of asparagines at 35 °C for 30 minutes in the presence of 0.05 M of potassium phosphate buffer solution at pH 8.
The motion of fast deuterons in most dense plasma focus devices ( DPF ) , may be characterized that it has a complex nature in its paths and this phenomena by describing a through gyrating motion with arbitrary changes in magnitude and direction . In this research , we focused on the understanding the theoretical concepts which depend deeply on the experimental results to explain the deuteron motions in the pinch region , and then to use the fundamental physical formulas that are deeply related to the explanation of this motion to prepare a suitable model for calculating the vertical and radial components for deuteron velocity by improving the Rung – Kutta Method
This study attempts to determine the necessary teaching competencies for teachers and the level of their importance in the development of their performance professionally and scientifically, and the progress towards a better future to achieve an effective level. Accordingly, the research community consists of the morning-preparatory schools for boys at the General Directorate of Education of Baghdad \ Rusafa2. The study sample included (68) teachers constituted 88.31% of the total community of teachers. As for the research tools, the researcher adopted the descriptive method by using the observation method in which the researcher prepared a list of teaching. For verifying the re
... Show MoreThe Aqra - Bekhme, Shiranish, Tanjero and Kolosh formations outcrop in the High Folded Zone, Northern Iraq in Erbil and Sulaymaniyah governorates. The formations have been studied at two selected geological sections (Bekhme Gorge and Zarda Bee). In this study, these formations are investigated based on both benthic and planktonic foraminifera. Depending on foraminifer’s investigation, three biozones have been recognized; two biozones are identified in the benthic foraminifera and the third one is identified in the planktonic foraminifera as follow:
- Siderolites calcitropodes - Orbitoides apiculatus - Omphalocyclus macroporus Assemblage zone.
- Loftusia morgani range zone.
- Aba
With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show More