The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial time by using the Benders decomposition technique and cutting plane approximation. To ensure the nonincreasing character of the Benders upper limit, a local branching method was also added to improve the convergence. Simulation results indicated that the proposed method is superior to the existing method and has better overall performance.
Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MorePOSSIBILITY OF APPLICATION THE BALANCED SCORECARD IN THE IRAQI INDUSTRIAL COMPANIES: A PROPOSED MODEL
The research is to identify the legend of the seven eyes amulet of Babylonian origin and the representations it carried of the link between the Babylonian past and the Islamic present presented in the design works of the promoted products, preserving its impact in the souls as a way to avoid the act of envy, and from this was the research problem that I want to get answers to, which That is (How was the legend of the seven-eyes amulet represented in the design of industrial products?), making its goal to identify how that legend was represented within the design work of marketed industrial products, and in order to reach the answer, the research presented many concepts starting with the legend in its various forms in industrial products.
... Show MoreThe current research aims to describe the level of responsiveness and awareness of the officials of the General Company for Construction Industries to the indicators of the blue market strategy of (1. reduction 2. exclusion 3. increase 4. innovation) and the degree of prioritization according to their importance as well as the differences in the responses of the sample investigated according to the personal variables. As a main tool in the collection of data from the sample, which consisted of(34) officers (Associate, Manager, Section Manager, Division Officer) in the company being investigated, and computed mean, standard deviations, percentage weights,and test (x2 ) based on the SPSS. The research reached the following
... Show MoreThe research aims to use a new technology for industrial water concentrating that contains poisonous metals and recovery quantities from pure water. Therefore, the technology investigated is the forward osmosis process (FO). It is a new process that use membranes available commercial and this process distinguishes by its low cost compared to other process. Sodium chloride (NaCl) was used as draw solution to extract water from poisonous metals solution. The driving force in the FO process is provided by a different in osmotic pressure (concentration) across the membrane between the draw and poisonous metals solution sides. Experimental work was divided into three parts. The first part includes operating the forward osmosis process using T
... Show MoreDetermination of the concentrations of some inorganic elements (Fe, Co, Cu, Cr, Ni, Pb, Cd) by Flame Atomic Absorption Spectroscopy, Electrothermal Atomic Absorption Spectroscopy, and Inductively Coupled Plasma. and two dangerous organic pollutants (PAH and phenols) by GC and UV in the wastewater of Z.LTF Zafaraniya Leather tanning factory, W.BF Al-Waziriya Battery factory, Ba.WLS Al-Bayaa Wastewater Lifting Station, and some points of Tigris River in Baghdad city taking into consideration the sampling time Varying (two months) and setting the temperature during the drawing of the model. The results of the analysis revealed that the wastewater was contaminated with phenols, PAHs, and metals (Pb, Cd, Cr, Cu) at high rates that exceeded the p
... Show More