Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-configuring mesh network in IoT sensor devices for better independent data collection quality. The research conducted in this paper is to build a mesh network using NodeMCU ESP 8266 and NodeMCU ESP 32 with two types of sensor, DHT 11 and DHT 22. Hence, the work here has evaluated on the delay performance metric in Line-of-Sight (LoS) and Non-Line-of-Sight (nLos) situation based on different network connectivity. The results give shorter delay time in LoS condition for all connected nodes as well as when any node fail to function in the mesh network compared to nLoS condition. The paper demonstrates that the IoT sensor devices composing the mesh network is a must to leverage the link communication performance for data collection in order to be used in IoT-based application such as fertigation system. It will certainly make a difference in the industry once being deployed on large scale in the IoT world and make the IoT more accessible to a wider audience.
The extraction of Cupressus sempervirens L. or cypress essential oil was studied in this paper. This cypress oil was extracted by using the hydro-distillation method, using a clevenger apparatus. Cupressus sempervirens L. leaves were collected from Hit city in Al-Anbar province – Iraq. The influences of three important parameters on the process of oil extraction; water which used as a solvent to the solid ratio (5:1 and 14:1 (ml solvent/g plant), temperature (30 to 100 °C) and processing time, were examined to obtain the best processing conditions to achieve the maximum yield of the essential oil. Also, the mathematical model was described to calculate the mass transfer coefficient. Therefore, the best conditions, that were obtained in
... Show MoreAleksandr Isayevich Solzhenitsyn was born in 1918 in Kislovodsk. His father was educated, and despite his peasantry origin, he got a university degree. Unfortunately, however, Solzhenitsyn could not recognize his father, for he died before his birth.
Solzhenitsyn was accused of being an opponent to the Soviet Union due to his activities of that time. He was exiled to a forced labour camp for eight years, on the surroundings of Moscow. He spent three years in Kazakhstan, and was sent to the life exile. He was set free in 1956. He worked as a teacher in in rural schools in Vladimir and then in Rezhran.
His greatest works were in the reign of Kherchov, and in 1962 appeared his story under the title of "One day in
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreIn this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show Moreشكلت التطورات التكنولوجية في وسائل التواصل الاجتماعي الناجمة عن العولمة معلم رئيسي في تحولات التنظيمات الإرهابية، وإنتاج انماط جديدة من الإرهابيين والمتطرفين القادرين على التفاعل مع الثورة المعلوماتية والاتصالية. ان معظم الجرائم الإرهابية الإلكترونية مرتبطة بالإنترنت وهو المسرح المفضل للمتطرفين فالأول يقتل والثاني يسوغ ويحرض ويجند، والذي جعل الإنترنت وسيلة فعالة كونها سهلة الاستخدام وسريعة الوصول إلى
... Show MoreThe application of low order panel method with the Dirichlet boundary condition on complex aircraft configuration have been studied in high subsonic and transonic speeds. Low order panel method has been used to solve the case of the steady, inviscid and compressible flow on a forward swept wing – canard configuration with cylindrical fuselage and a vertical stabilizer with symmetrical cross section. The aerodynamic coefficients for the forward swept wing aircraft were calculated using measured wake shape from an experimental work on same model configuration. The study showed that the application of low order panel method can be used with acceptable results