Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-configuring mesh network in IoT sensor devices for better independent data collection quality. The research conducted in this paper is to build a mesh network using NodeMCU ESP 8266 and NodeMCU ESP 32 with two types of sensor, DHT 11 and DHT 22. Hence, the work here has evaluated on the delay performance metric in Line-of-Sight (LoS) and Non-Line-of-Sight (nLos) situation based on different network connectivity. The results give shorter delay time in LoS condition for all connected nodes as well as when any node fail to function in the mesh network compared to nLoS condition. The paper demonstrates that the IoT sensor devices composing the mesh network is a must to leverage the link communication performance for data collection in order to be used in IoT-based application such as fertigation system. It will certainly make a difference in the industry once being deployed on large scale in the IoT world and make the IoT more accessible to a wider audience.
The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c
... Show MoreInterval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show MoreIn this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q, this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo
... Show MoreThis research provides a new method to study praise poetry that can be used as a course to teach English and Arabic to students in the College of Education. This research answers two questions:
- Is it possible to examine praise poetry as a tagmeme?
- Is this analysis of great help in teaching English and Arabic to students in the College of Education?
The data that will be chosen for the purpose of analysis are two of Shakespeare's sonnets and two of AL Mulik's poems. The sonnets selected for this purpose are 17 and 18. AL Mulik's poems selected for the same purpose are 8 and 9.
&nbs
... Show MoreThe concept of self is considered one of the important dimensions in the human personality, because feeling of self is an important characteristic in this phase from the psychological point of view.
The first source which forms the concept of self is the physical image, where the built and appearance of the body is considered among the vital matters which determine the person's image of himself/herself.
The current research aims to:
1) Identify the level of physical self concept at the kindergarten children.
2) Identify the level of psychological self concept at the kindergarten children.
3) Iden
... Show MoreThis research a mining at evaluation the efficiency of the nursing performance depended on standards of W.H.O. via application standards of W.H.O on the nursing personnel in medical city office, in light of it, it has design world evaluation list, and a sample was chosen from the nursing personnel in given researched the organization whom they are evaluated according to the standards of W.H.O for the nursing performance included of ten standards, divided in to 45 question , besides the evaluation list, the researcher get assistance of some tools of collection information via actual checking and personal interviews, a number of statistical means were used to manipulate t
... Show MoreObjective(s): To assess Baghdad University students’ knowledge and attitudes toward HIV/AIDS, and to find out
the relationship of Baghdad University students’ knowledge and attitudes with certain variables (gender,
socioeconomic status, field of study).
Methodology: A descriptive analytic study was used to assess the knowledge and attitudes of Baghdad University
Students’ toward HIV/AIDS. The study was conducted (November 1st 2012 to July 15th 2013). A non-probability
(purposive sample) of 400 students (males-138 and females-262) were selected from four colleges and they were
in the fourth class, a probability (stratified random) method was used to select four colleges at University of
Baghdad as a study settin