Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.
Objective: To determine the correlation between the second derivative of digital pulse wave and the QT variability index. Method: The cross-sectional study was conducted from October 2021 to May 2022 at the Department of Physiology, College of Medicine, University of Mustansiriyah, Baghdad, Iraq, and comprised healthy women. Samples were raised by simple random technique. Digital pulse waves were captured using a fingertip pulse wave transducer. Lab Chart Pro version 7.2 was used to automatically detect and quantify the amplitude of A, B, C, D and E waves expressed by the second derivative. QT interval of each beat was recorded by electrocardiogram, and was calculated automatically via Lab chart Pro version 7.2 without averaging. D
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreThe historical center's landscape suffers from neglect, despite their importance and broad capabilities in enhancing the cultural value of the historical center, as landscape includes many heterogeneous human and non-human components, material and immaterial, natural and manufactured, also different historical layers, ancient, modern and contemporary. Due to the difference in these components and layers, it has become difficult for the designer to deal with it. Therefore, the research was directed by following a methodology of actor-network theory as it deals with such a complex system and concerned with an advanced method to connect the various components of considering landscape as a ground that can include various elements and deal wi
... Show MoreMeasurements of Hall effect properties at different of annealing temperature have been made on polycrystalline Pb0.55S0.45 films were prepared at room temperature by thermal evaporation technique under high vacuum 4*10-5 torr . The thickness of the film was 2?m .The carrier concentration (n) was observed to decrease with increasing the annealing temperature. The Hall measurements showed that the charge carriers are electrons (i.e n-type conduction). From the observed dependence on the temperature, it is found that the Hall mobility (µH), drift velocity ( d) carrier life time ( ), mean free path (?) were increased with increasing annealing temperature
IH Abdul-Abbas, QJ Rashid, M RasimYounus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 9
The aim of this paper is to examine cases of deletion not dependent on linguistic context. Perlmutter (1971) claims that any sentence other than an imperative1 in which there is an S that does not contain a subject in the surface structure is ungrammatical. Dillon (1978) counts elliptical sentences such as ^ Beg your pardon2 as grammatically incomplete (and hence as strictly ungrammatical). Such statements are, however, not without problems for reasons that will be given below.
dictates the need to study the cultural aspects of the context and the consequent relations between the person and the objective environment surrounding him, as the philosophical understanding of the role of culture has led to the emergence of new theoretical interpretations of design that are organically linked with the development of society, especially that the development of the human environment philosophically and culturally is linked to the philosophical perception of its role in Culture as a precondition for new theoretical interpretations of design.
From the above, this problem can be studied by defining the following question (What are the implications of the cultural context in graphic design)?
The research included
Each book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani
Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show More