Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mobile vehicles. Several studies have tackled the task offloading problem in the VFC field. However, recent studies have not carefully addressed the transmission path to the destination node and did not consider the energy consumption of vehicles. This paper aims to optimize the task offloading process in the VFC system in terms of latency and energy objectives under deadline constraint by adopting a Multi-Objective Evolutionary Algorithm (MOEA). Road Side Units (RSUs) x-Vehicles Mutli-Objective Computation offloading method (RxV-MOC) is proposed, where an elite of vehicles are utilized as fog nodes for tasks execution and all vehicles in the system are utilized for tasks transmission. The well-known Dijkstra's algorithm is adopted to find the minimum path between each two nodes. The simulation results show that the RxV-MOC has reduced significantly the energy consumption and latency for the VFC system in comparison with First-Fit algorithm, Best-Fit algorithm, and the MOC method.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe performance of a synergistic combination of electrocoagulation (EC) and electro-oxidation (EO) for oilfield wastewater treatment has been studied. The effect of operative variables such as current density, pH, and electrolyte concentration on the reduction of chemical oxygen demand (COD) was studied and optimized based on Response Surface Methodology (RSM). The results showed that the current density had the highest impact on the COD removal with a contribution of 64.07% while pH, NaCl addition and other interactions affects account for only 34.67%. The optimized operating parameters were a current density of 26.77 mA/cm2 and a pH of 7.6 with no addition of NaCl which results in a COD removal efficiency of 93.43% and a specific energy c
... Show MoreWith the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreGrain size and shape are important yield indicators. A hint for reexamining the visual markers of grain weight can be found in the wheat grain width. A digital vernier caliper is used to measure length, width, and thickness. The data consisted of 1296 wheat grains, with measurements for each grain. In this data set, the average weight (We) of the twenty-four grains was measured and recorded. To determine measure of the length (L), width (W), thickness (T), weight (We), and volume(V). These features were manipulated to develop two mathematical models that were passed on to the multiple regression models. The results of the weight model demonstrated that the length and width of the grai
Background: Nutrition and diet can affect the development and integrity of the oral cavity including the development and eruption of primary teeth. Aims of the study: The study was carried out to determine the effect of weight status of the child and gender on the number of deciduous teeth erupted in the oral cavity. Material and method: A children from the age 12 months -35 months attending Specialist Health Center and children of Nursery in Al-Khadraa, and nursery in Al- Aadamyia and Hay-Heteen. The number of teeth erupted, gender and body mass index were recorded. Results: The results showed that eruption of primary dentition was quicker in children who were overweight than those with normal weight and underweight and faster in girls
... Show MoreThere is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used
... Show More