Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.
Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising technology for a wide range of ocean monitoring applications. The UWSNs suffer from unique challenges of the underwater environment, such as dynamic and sparse network topology, which can easily lead to a partitioned network. This results in hotspot formation and the absence of the routing path from the source to the destination. Therefore, to optimize the network lifetime and limit the possibility of hotspot formation along the data transmission path, the need to plan a traffic-aware protocol is raised. In this research, we propose a traffic-aware routing protocol called PG-RES, which is predicated on the ideas of Pressure Gradient and RESistance concept. The proposed
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreA problem of solid waste became in the present day common global problem among all countries, whether developing or developed countries, and can say that no country in the world today is immuning from this dilemma which must find appropriate solutions. The problem has reached a stage that can not ignore or delay, but has became a daily problem occupies the minds of ecologists, economists and politicians took occupies center front in the lists of priorities for the countries in terms of finding solutions to the rapid scientific and radical them. and that transport costs constitute an important component of total costs borne by the municipal districts in the process of disposal of solid waste, so any improvement in the
... Show MoreObjective: To determine the correlation between the second derivative of digital pulse wave and the QT variability index. Method: The cross-sectional study was conducted from October 2021 to May 2022 at the Department of Physiology, College of Medicine, University of Mustansiriyah, Baghdad, Iraq, and comprised healthy women. Samples were raised by simple random technique. Digital pulse waves were captured using a fingertip pulse wave transducer. Lab Chart Pro version 7.2 was used to automatically detect and quantify the amplitude of A, B, C, D and E waves expressed by the second derivative. QT interval of each beat was recorded by electrocardiogram, and was calculated automatically via Lab chart Pro version 7.2 without averaging. D
... Show MoreThe historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show Moredictates the need to study the cultural aspects of the context and the consequent relations between the person and the objective environment surrounding him, as the philosophical understanding of the role of culture has led to the emergence of new theoretical interpretations of design that are organically linked with the development of society, especially that the development of the human environment philosophically and culturally is linked to the philosophical perception of its role in Culture as a precondition for new theoretical interpretations of design.
From the above, this problem can be studied by defining the following question (What are the implications of the cultural context in graphic design)?
The research included
The aim of this paper is to examine cases of deletion not dependent on linguistic context. Perlmutter (1971) claims that any sentence other than an imperative1 in which there is an S that does not contain a subject in the surface structure is ungrammatical. Dillon (1978) counts elliptical sentences such as ^ Beg your pardon2 as grammatically incomplete (and hence as strictly ungrammatical). Such statements are, however, not without problems for reasons that will be given below.
Each book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani