<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency. The bulk binding approaches were used to enhance the mobility signaling for MNs which are moving together from one MAG to another by exchanging a single bulk binding update message. However, in some cases there might be several MNs move at the same time but among different MAGs. In this paper, a bulk registration scheme based on the clustered sensor PMIPv6 architecture is proposed to reduce the mobility signaling cost by creating a single bulk message for all MNs attached to the cluster. Our mathematical results show that the proposed bulk scheme enhances the PMIPv6 performance by reducing the total handoff latency.</p>
Many economists believe that the development and promotion of small and medium-sized enterprises is one of the most important sources of economic and social development in countries in general and in developing countries in particular. This is considered to be an essential starting point for increasing production capacity and contributing to tackling poverty and unemployment. In view of the importance of these projects, most developing countries have concentrated their efforts on them. They have encouraged the establishment of small and medium industries, especially after they have proved their ability and efficiency in dealing with the major problems facing different economies.
The banking system plays an important role by finan
... Show MoreCognitive-behavioral therapy is one of the most important relatively recent; treatment programs that attempt to modify behavior and control psychological disorders by modifying the individual's thinking style and awareness of himself and his environment, and cognitive reconstruction by replacing negative thoughts with positive ones. The current study aimed to know the effectiveness of a cognitive behavioral treatment program in reducing nervous fatigue among mothers of children with cerebral palsy. The sample on which the nervous fatigue scale was applied consisted of (30) mothers whose son suffers from cerebral palsy, and the results indicated that (24) mothers suffer from nervous fatigue. This sample was divided
... Show MoreWithin the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreManufacturing industries are at the beginning of the thinking of those who put economic policies in developed countries and also more in developing countries, where manufacturing is the engine of industrial and economic development through its performance and its effective role in the formation of GDP, as well as the great advantages that characterize this sector and affect Largely on sustainable development, as well as its importance in its influential role in protecting national industry through increased exports and reduced imports.
Iraq is one of the countries that rely on its oil economy to rely entirely on the provision of needs and requirements of the state, and this
... Show MoreLearning the vocabulary of a language has great impact on acquiring that language. Many scholars in the field of language learning emphasize the importance of vocabulary as part of the learner's communicative competence, considering it the heart of language. One of the best methods of learning vocabulary is to focus on those words of high frequency. The present article is a corpus based approach to the study of vocabulary whereby the research data are analyzed quantitatively using the software program "AntWordprofiler". This program analyses new input research data in terms of already stored reliable corpora. The aim of this article is to find out whether the vocabularies used in the English textbook for Intermediate Schools in Iraq are con
... Show MoreObjective: The aim of this study was to compare the marginal microleakage between bulk-fill, preheated bulk-fill, and bulk-fill flowable composite resins above and below cemento-enamel junction (CEJ) using micro-computed tomography. Methods: Sixty freshly extracted premolar teeth were prepared with a slot shaped cavities of a total of 120 Class II: 3mm (bucco-lingual), 2mm (mesio-distal) with mesial-gingival margin located 1mm coronal to CEJ, and distal gingival margin located 1mm apical to the CEJ. The samples were randomly divided into two main groups according to the restorative material (Tetric EvoCeram and 3M Filtek), and each group was further sub-divided into three subgroups according to the consistency (bulk fill, preheated bulk fil
... Show MoreThis review discusses precision agriculture techniques that help reduce the effects of soil degradation and improve soil health, based on an analysis of studies published in scientific databases such as Web of Science, Scopus, IEEE Xplore, Google Scholar, and ScienceDirect, with an emphasis on recent field research. The methodology included a qualitative analysis of case studies and application experiments in different areas to evaluate the impact of technologies such as controlled traffic farming (CTF), mechanized guidance (MG), precision fertilization (PF), precision irrigation (PI), conservation tillage (CT), and precision tillage (PT). Research results showed, CT to maintain soil structure and reduce organic matter loss increases soil f
... Show MoreRealizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More