Wireless Sensor Networks (WSNs) are composed of a collection of rechargeable sensor nodes. Typically, sensor nodes collect and deliver the necessary data in response to a user’s specific request in many application areas such as health, military and domestic purposes. Applying routing protocols for sensor nodes can prolong the lifetime of the network. Power Efficient GAthering in Sensor Information System (PEGASIS) protocol is developed as a chain based protocol that uses a greedy algorithm in selecting one of the nodes as a head node to transmit the data to the base station. The proposed scheme Multi-cluster Power Efficient GAthering in Sensor Information System (MPEGASIS) is developed based on PEGASIS routing protocol in WSN. The aim of the proposed scheme is to introduce a transmission power control system based on the residual energy level and the energy harvesting status of each sensor node to extend the overall lifetime of WSN and to balance the energy usage, this leads to increasing network lifetime and decreasing energy consumption. MPEGASIS outperforms PEGASIS protocol by about 19%, and LEACH protocol by about 34%. For the sake of performance evaluation, MPEGASIS protocol besides PEGASIS and LEACH protocols are simulated and compared using Network Simulator (NS2).
t-Self-Compacting Concrete (SCC) reduces environmental noise and has more workability. This research presents an investigation of the behavior of SCC under mechanical loading (impact loading). Two types of cement have been used to produce SCC mixtures, Ordinary Portland Cement (OPC) and Portland Limestone Cement (PLC), which reduces the emission of carbon dioxide during the manufacturing process. The mixes were reinforced with Carbon Fiber Reinforced Polymer (CFRP) which is usually used to improve the seismic performance of masonry walls, to replace lost steel reinforcements, or to increase column strength and ductility. Workability tests were carried out for fresh SCC. Prepared concrete slabs of 500×500×50mm were tested for lo
... Show MoreNon-thermal plasma(Dielectric barrier discharge) has many uses including living tissue sterilization, inactivation of the bacteria, excimer formation, angiogenesis, and surface treatment. This research aim is to use cold plasma as a tool to search the effect of the dielectric barrier discharge system at room temperature on human sperm motility and DNA integrity. This work was performed on 60 human semen samples suffering from low motility; each sample was prepared by centrifugation method, then each semen sample was divided into two sections, the first section is before significant exposure to the plasma system (DBD) and the second section is after treatment with the DBD system at ambient temperature. Before and after exposure to non-the
... Show MoreThe aim of the research is to investigate the effect of cold plasma on the bacteria grown on texture of sesame paste in its normal particle and nano particle size. Starting by using the image segmentation process depending on the threshold method, it is used to get rid of the reflection of the glass slides on which the sesame samples are placed. The classification process implemented to separate the sesame paste texture from normal and abnormal texture. The abnormal texture appears when the bacteria has been grown on the sesame paste after being left for two days in the air, unsupervised k-mean classification process used to classify the infected region, the normal region and the treated region. The bacteria treated with cold plasma, t
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The purpose of the present work is to calculate the expectation value of potential energy for different spin states (??? ? ???,??? ? ???) and compared it with spin states (??? , ??? ) for lithium excited state (1s2s3s) and Li- like ions (Be+,B+2) using Hartree-Fock wave function by partitioning techanique .The result of inter particle expectation value shows linear behaviour with atomic number and for each atom and ion the shows the trend ??? < ??? < ??? < ???
This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show MoreIn this work, we introduce Fibonacci– Halpern iterative scheme ( FH scheme) in partial ordered Banach space (POB space) for monotone total asymptotically non-expansive mapping (, MTAN mapping) that defined on weakly compact convex subset. We also discuss the results of weak and strong convergence for this scheme.
Throughout this work, compactness condition of m-th iterate of the mapping for some natural m is necessary to ensure strong convergence, while Opial's condition has been employed to show weak convergence. Stability of FH scheme is also studied. A numerical comparison is provided by an example to show that FH scheme is faster than Mann and Halpern iterative
... Show MoreThis paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreThis article presents a polynomial-based image compression scheme, which consists of using the color model (YUV) to represent color contents and using two-dimensional polynomial coding (first-order) with variable block size according to correlation between neighbor pixels. The residual part of the polynomial for all bands is analyzed into two parts, most important (big) part, and least important (small) parts. Due to the significant subjective importance of the big group; lossless compression (based on Run-Length spatial coding) is used to represent it. Furthermore, a lossy compression system scheme is utilized to approximately represent the small group; it is based on an error-limited adaptive coding system and using the transform codin
... Show More