The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show MoreUnderwater Wireless Sensor Networks (UWSNs) have emerged as a promising technology for a wide range of ocean monitoring applications. The UWSNs suffer from unique challenges of the underwater environment, such as dynamic and sparse network topology, which can easily lead to a partitioned network. This results in hotspot formation and the absence of the routing path from the source to the destination. Therefore, to optimize the network lifetime and limit the possibility of hotspot formation along the data transmission path, the need to plan a traffic-aware protocol is raised. In this research, we propose a traffic-aware routing protocol called PG-RES, which is predicated on the ideas of Pressure Gradient and RESistance concept. The proposed
... Show MoreReliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
Optical fiber chemical sensor based surface Plasmon resonance for sensing and measuring the refractive index and concentration for Acetic acid is designed and implemented during this work. Optical grade plastic optical fibers with a diameter of 1000μm were used with a diameter core of 980μm and a cladding of 20μm, where the sensor is fabricated by a small part (10mm) of optical fiber in the middle is embedded in a resin block and then the polishing process is done, after that it is deposited with about (40nm) thickness of gold metal and the Acetic acid is placed on the sensing probe.
The research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to the creation of Eve and the class
... Show MoreThe research aims to answer the questions that revolve in the mind of mankind about how to create creation, how it existed prior to creation, who created existence, and the characteristics of that presence. The researcher also wanted to show that the culture of Imam Ali (peace be upon him) In the book of Adam, peace be upon him, God has punished Adam (peace be upon him) for not having sinned. Because his wife is the one who fed him the fruit of the tree, and this is contrary to what was stated in the sermon of Imam (peace be upon him) who Z Adam (peace be upon him) is the one who trusted Satan and Gwighth.
We note that the approach of the rhetoric has pointed to the creation of angels and did not refer to
... Show MoreZSM-5 zeolite was synthesis under hydrothermal conditions at 175oC. The synthesis parameters have been investigated to find optimum synthesis method. Firstly, the crystallization time has been investigated to find the optimum crystallization time. Also, the ageing time was studied. The morphology, structure, and composition of the synthesized ZSM-5 zeolite were characterized using scanning electron microscopy (SEM), pH meter, viscometer, and X-ray powder diffraction (XRD). The bulk Si/Al ratio of ZSM-5 zeolite was in the range of 9.5—11.7. The synthesized ZSM-5 zeolite with appropriate ageing time could adjust crystal size and degree of the crystallinity. The crystal size of ZSM-5 zeolite obtained at an agei
... Show MoreIn this work, some of new 2-benzylidenehydrazinecarbothioamide derivatives have been prepared by condensation of thiosemicarbazide and different substituted aromatic benzaldehydes in presence of glacial acetic acid to give compounds (1-6), these compounds have characterized by its physical properties and spectroscopic methods. This work also included theoretical study to prove the ability of these compounds as corrosion inhibitors; The program package of Gaussian 09W with its graphical user interface GaussView 5.0 had used for this purpose; the methods of Density Functional Theory (DFT) with basis set of 6-311G (d,p) / hybrid function of B3LYP and semiempirical method of PM3 have been used, the study included theoretical simulation
... Show MoreA series of Schiff base-bearing salicylaldehyde moiety compounds (1-4) had been designed, synthesized, subjected to insilico ADMET prediction, molecular docking, characterization by FT-IR, and CHNS analysis techniques, and finally to their Anti-inflammatory profile using cyclooxygenase fluorescence inhibitor screening assay methods along with standard drugs, celecoxib, and diclofenac. The ADMET studies were used to predict which compounds would be suitable for oral administration, as well as absorption sites, bioavailability, TPSA, and drug likeness. According to the results of ADME data, all of the produced chemicals can be absorbed through the GIT and have passed Lipinski’s rule of five. Through molecular docking with PyRx 0.8, these
... Show More