Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To address this challenge, This paper proposes the Neural Control Exponential Weight of Priority Based Rate Control (NEWPBRC) algorithm for adjusting the node transmission rate and facilitate the problem of congestion occur in WMSNs. The proposed algorithm combines Neural Network Controller (NC) with the Exponential Weight of Priority Based Rate Control (EWPBRC) algorithms. The NC controller can calculate the appropriate weight parameter λ in the Exponential Weight (EW) algorithm for estimating the output transmission rate of the sink node, and then ,on the basis of the priority of each child node , an appropriate transmission rate is assigned . The proposed algorithm can support four different traffic classes namely, Real Time traffic class (RT class); High priority, Non Real-Time traffic class (NRT1 class); Medium priority, Non Real-Time traffic class (NRT2 class); and Low priority, Non Real-Time traffic class (NRT3 class). Simulation result shows that the proposed algorithm can effectively reduce congestion and enhance the transmission rate. Furthermore, the proposed algorithm can enhance Quality of Service (QoS) by achieve better throughput, and reduced the transmission delay and loss probability.
Background: Humans skin, is the largest organ of the integumentary system, it has multiple layers of ectodermal tissue and guards the underlying muscles, bones, ligaments and internal organs. Pityriasis versicolor is the prototypical skin disease etiologically connected to Malassezia species. Malassezia furfur is the primary causative agent of pityriasis versicolor which causes either hyperpigmentation or hypopigmentation of the skin.
Objective: To identify of Malassezia furfur associated with pityriasis versicolor patients and healthy control by using molecular detection methods.
Material and Methods: Sixty patients suffering from pityriasis versicolor disease who attended Medical Imammaine Kadhmain City from beginning of 1st Dece
Protein bound fucose (PBF), protein bound hexose (PBHex), and total calcium {T.Ca) were 'determined in sera of (40) hy-p.ertnyroidism , (40) hypothyroidism patients and (40) controL The resultsr vealed a significant decrease in the kwel of PBF, PBHex and T.Ca in sera of patients with .hyperthyroidism compared to control; Inc se Qf PBF. there nQ difference in its level betwe.en patients with hypothyroidism and control group. While there is a significant increment in PBHex leveli:n both hyper and hypothyroidism With respect to that of control Result indicates, that total calcium levels were i.n the nomml range for all p tients groups. Patient compa
... Show MoreAbstract : Objectives: The aims of the study are to identify the condition causes respiratory failure in both sex and to find out the relationship between prognosis and mortality rate with condition causes respiratory failure. Methodology : Descriptive study was carried out in Al- Yarmook Hospital in Respiratory care Unit in Baghdad from the 1st of August 2003 to 1st of August 2004, the sample consist of 300 patients (150) males and (150) females, descriptive and inferential statistics procedures were applied to the data analysis Results : The results shows that 24.4% of patients effect by post-operative compl
Samples from tap water were chosen to be examined as one of the possible modes of G. lamblia and other parasites transmission. 144 domestic filter units were randomly distributed to houses in Baghdad in Al-Sadr City and surrounding regions then the suspended materials were examined microscopically by direct wet mount after centrifugal sedimentation method, and after staining with modified Ziehl-Neelsen (acid fast) stain. The results showed that 5/144 (3.47%) samples contained G. lamblia cysts, 3/144 (2.08%) contained E. histolytica/E. dispar cyst, while each of Cryptosporidium spp. and Cyclospora cayetanensis oocysts were observed in two samples (1.38%); also free living amoeba, ciliates and flagellates were detected in all samples. This
... Show MoreThis paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show MoreIn this work, the classical continuous mixed optimal control vector (CCMOPCV) problem of couple nonlinear partial differential equations of parabolic (CNLPPDEs) type with state constraints (STCO) is studied. The existence and uniqueness theorem (EXUNTh) of the state vector solution (SVES) of the CNLPPDEs for a given CCMCV is demonstrated via the method of Galerkin (MGA). The EXUNTh of the CCMOPCV ruled with the CNLPPDEs is proved. The Frechet derivative (FÉDE) is obtained. Finally, both the necessary and the sufficient theorem conditions for optimality (NOPC and SOPC) of the CCMOPCV with state constraints (STCOs) are proved through using the Kuhn-Tucker-Lagrange (KUTULA) multipliers theorem (KUTULATH).
ABSTRACT
The study was conducted at the ruminant research station of the general commission for agricultural research/Ministry of Agriculture, as well as the laboratory of genetic resources of the department of livestock/Ministry of Agriculture and the laboratory of the college of agriculture engineering science, with the aim of determine the genotypic of the expression region (intron 2 and part of exon 3) of the LHX3 gene And its relationship to the fertility rate in local and Shami goats. For this purpose, the RFLP technique was used, and the percentages of genotypes for the LHX3 gene in the local goat sample were 29.17, 50.00, 20.83 for the TT, AT, and AA genotypes, respectively, while in the Shami goa
... Show MoreOur aim in this work is to study the classical continuous boundary control vector problem for triple nonlinear partial differential equations of elliptic type involving a Neumann boundary control. At first, we prove that the triple nonlinear partial differential equations of elliptic type with a given classical continuous boundary control vector have a unique "state" solution vector, by using the Minty-Browder Theorem. In addition, we prove the existence of a classical continuous boundary optimal control vector ruled by the triple nonlinear partial differential equations of elliptic type with equality and inequality constraints. We study the existence of the unique solution for the triple adjoint equations
... Show MoreNetwork security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed