Simulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Networks (BTRM-WSN) in terms of the accuracy and the average path length suggested by each model is presented. Both models give quite good and accurate outcomes over oscillating WSNs. Also it must be mentioned that the evaluation environment used here is Trust and Reputation Model Simulator for WSN.
The American-European dispute is one of the important issues that dominated international relations during the nineteenth century in particular, although the previous period witnessed the emergence of a dispute over the right to control these colonies, which the United States of America, especially after the proclamation of the Monroe Doctrine in 1823, is a natural right and that It has the ability to prevent European countries from interfering in the affairs of the American continent, so the United States of America entered into continuous disputes with European countries, which were constantly directing their eyes towards the Spanish colonies in the American continent. But the American government had priority in controlling those colonies
... Show MoreFingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds
... Show MoreIn the present work, zeolite Y has been synthesized successfully by sol-gel method.Zeolite was synthesized by crystallization of the final gel which consist from seeding and feed stock gels at 85 oC. HY zeolite was prepared by an ion exchange process with ammonium chloride solution and then loaded with different percentages of platinum and titanium by the wet - impregnation method.
X-ray Diffraction (XRD), X-ray Florescence (XRF), Scanning Electron Microscopy (SEM), BET surface area and, Crushing strength were used to characterize the synthesized and prepared catalysts . Results showed high crystallinity 90% with silica to alumina ratio 5 for HY, high surface area of 600 m2/g and pore
... Show MoreIn this work, a numerical study is performed to predict the solution of two – dimensional, steady and laminar mixed convection flow over a square cylinder placed symmetrically in a vertical parallel plate. A finite difference method is employed to solve the governing differential equations, continuity, momentum, and energy equation balances. The solution is obtained for stream function, vorticity and temperature as dependent variables by iterative technique known as successive over relaxation. The flow and temperature patterns are obtained for Reynolds number and Grashof number at (Re= -50,50,100,-100) (positive or negative value refers to aidding or opposing buoyancy , +1 assisting flow, -1 opposing flow) and (102 to 105) , respective
... Show MoreTrickle bed reactor was used to study the hydrogenation of nitrobenzene over Ni/SiO2 catalyst. The catalyst was prepared using the Highly Dispersed Catalyst (HDC) technique. Porous silica particles (capped cylinders, 6x5.5 mm) were used as catalyst support. The catalyst was characterized by TPR, BET surface area and pore volume, X-ray diffraction, and Raman Spectra. The trickle bed reactor was packed with catalyst and diluted with fine glass beads in order to decrease the external effects such as mass transfer, heat transfer and wall effect. The catalyst bed dilution was found to double the liquid holdup, which increased the catalyst wetting and hence, the gas-liquid mass transfer rate. The main product of the hydrogenation reaction of n
... Show MoreModifying of HY/Zeolite is by loading nickel for applying catalyst in thermal catalytic cracking of furfural extract-40 from the lubricating base oil unit. The study involved the characterizing of HY-zeolite and promoted catalyst with nickel by X-ray diffraction analysis, Scanning electron microscopy (SEM), BET (Brunauer, Emmett, and Teller), and infrared ray analyses FTIR. The catalytic thermal cracking tubular reactor with a fixed bed with two type catalysts; HY/zeolite and Ni HY/zeolite, individually at a temperature of 580oC with LHSV 5h-1 was investigated. The results indicated that increase the conversion of catalytic cracking of furfural extract-40 also increases the yield of useful petroleum
... Show MoreIn this paper we generalize Jacobsons results by proving that any integer in is a square-free integer), belong to . All units of are generated by the fundamental unit having the forms
Our generalization build on using the conditions
This leads us to classify the real quadratic fields into the sets Jacobsons results shows that and Sliwa confirm that and are the only real quadratic fields in .
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThis study reported the investigation of the Radio Frequency (RF) signal propagation of Global System for Mobile Communications (GSM) coverage in Emmanuel Alayande College of Education (EACOED), Oyo, Oyo State, Nigeria. The study aims at amplifying the quality of service and augment end users' sensitivity of the wireless services operation. The drive test method is adopted with estimation of coverage level and received signal strength. The Network Cell Info Lite application installed in three INFINIX GSM mobile phones was employed to take the measurement of the signal strength received from the transmitting stations of different mobile networks. The results of the study revealed that MTN has the maximum signal strength with a mean value
... Show More