Seyyed Ahmad Edalatpanah
Abstract
System of linear equations plays an important role in science and engineering. One of the applications of this system occurs in the discretization of the partial differential equations. This paper aims to investigate an experimental comparison between two kinds of iterative models for solving the elliptic ...
Read More
System of linear equations plays an important role in science and engineering. One of the applications of this system occurs in the discretization of the partial differential equations. This paper aims to investigate an experimental comparison between two kinds of iterative models for solving the elliptic partial differential equations. Different tools of solution such as stationary and non-stationary iterative methods with preconditioning models have been studied. Two types of discretization schemes (centered and hybrid) have been also considered for the comparison of the solution.
Muhammad Nadeem
Abstract
In this work, we study the Variational Iteration Method (VIM) accompanied by He's polynomials for obtaining the solution of the temperature distribution in the casting-mould heterogeneous system with fractional order. The combined form of VIM and the Homotopy Perturbation Method (HPM) is called the Variational ...
Read More
In this work, we study the Variational Iteration Method (VIM) accompanied by He's polynomials for obtaining the solution of the temperature distribution in the casting-mould heterogeneous system with fractional order. The combined form of VIM and the Homotopy Perturbation Method (HPM) is called the Variational Iteration Homotopy Perturbation Method (VIHPM) which yields to implement the system of equations directly. The identification of the Lagrange multiplier is essentially more reliable and higher accurate for such type of problems. The approximate solution converges rapidly to the exact solution which confirms the accuracy of this approach. Some graphical representations are demonstrated to show the validity of this approach.
Hatıra Günerhan
Abstract
In this article, the chemical kinetics problem is presented. The Differential Transformation Method (DTM) is presented to find an approximate analytical solution to the chemical kinetics problems. Proposed problem is system of nonlinear ordinary differential equations. We show converges analysis of the ...
Read More
In this article, the chemical kinetics problem is presented. The Differential Transformation Method (DTM) is presented to find an approximate analytical solution to the chemical kinetics problems. Proposed problem is system of nonlinear ordinary differential equations. We show converges analysis of the differential transform method. DTM applied to two examples. The method shows the form of fast converging series and the results prove the applicability of the proposed method, which gives accurate results.
Ibrahim Mekawy; Bardia Khalilian
Abstract
By using Internet of Things (IoT) we can make the things easier for our livelihood. The concept of smart parking in sensors is the combination of IoT. I.E By sending the status of the parking IoT through the internet, So that any person can see that which parking IoT is empty through the map and can ...
Read More
By using Internet of Things (IoT) we can make the things easier for our livelihood. The concept of smart parking in sensors is the combination of IoT. I.E By sending the status of the parking IoT through the internet, So that any person can see that which parking IoT is empty through the map and can easily park the vehicle. By using IoT the user can track the availability of the parking IoT through the web application to park the vehicle. In the existing systems the parking done manually and the user will probably had cases for looking for parking IoT for long time and there will be a chance for mismatching of parking IoT for the user. Smart parking provides parking efficiency and it reduces the time of searching for parking. The main concept of smart parking is to reduce searching for the parking IoT. Smart parking can optimize the traffic flows in the entire cities. The application uses IoT sensors just to receive the information about the parking IoT ’s.
Hashem Saberi Najafi; Sayed Arsalan Sajjadi; Hossein Aminikhah
Abstract
In this work, we consider a collocation method for solving the pantograph-type Volterra Hammerstein integral equations based on the first kind Chebyshev polynomials. We use the Lagrange interpolating polynomial to approximate the solution. The convergence of the presented method has been analyzed by ...
Read More
In this work, we consider a collocation method for solving the pantograph-type Volterra Hammerstein integral equations based on the first kind Chebyshev polynomials. We use the Lagrange interpolating polynomial to approximate the solution. The convergence of the presented method has been analyzed by over estimating for error. Finally, some illustrative examples are given to test the accuracy of the method. The presented method is compared with the Legendre Tau method.
lu fan
Abstract
Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2 which operate autonomously conditions such as cost invisible deployment and many application domains, lead to small size and limited resources ...
Read More
Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2 which operate autonomously conditions such as cost invisible deployment and many application domains, lead to small size and limited resources sensors. WSNs are susceptible to many types of link layer attacks and most of traditional networks security techniques are unusable on WSNs due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively.
Salwa Abdou El-Morsy
Abstract
Man has been benefited a wholesome with the idea of sensors. Sensors not only help us in gathering data, but also provide us a solution to many unsolvable problems. Applicating them over a wide area is quite a tough task, Hence the idea of Wireless Sensors Networking has been introduced. This idea has ...
Read More
Man has been benefited a wholesome with the idea of sensors. Sensors not only help us in gathering data, but also provide us a solution to many unsolvable problems. Applicating them over a wide area is quite a tough task, Hence the idea of Wireless Sensors Networking has been introduced. This idea has boosted the success rate of different experiments in the fields of health, Finance, Security, etc. where simple factors like temperature, motion, smoke, pressure etc. are used to muster the required data. These Wireless sensors are basically connected and are allowed to share their information over a network which indeed is connected to the main data center. Simply said this accumulation of sensors wirelessly has provided immense advantage for today’s era. Sensors have extended the sustainability of mankind by making work easy in both domestic and hostile environments.
Shahed Mohammadi; Niloufar Hemati; Neda Mohammadi
Abstract
In today's world, where speech recognition has become an integral part of our daily lives, the need for systems equipped with this technology has increased dramatically in the past few years. This research aims to locate the two selected Persian words in any given audio file. For this purpose, two standard ...
Read More
In today's world, where speech recognition has become an integral part of our daily lives, the need for systems equipped with this technology has increased dramatically in the past few years. This research aims to locate the two selected Persian words in any given audio file. For this purpose, two standard and native datasets were prepared for this model one for train and the other for the test. Both datasets were converted into images of audio waveforms. Using the object detection technique, the model could extract different bounding boxes for each test audio, and then each box image goes through a CNN classifier and returns a corresponding label. Finally, a threshold is set so that only boxes with high accuracy are displayed as output. The results showed 93% accuracy for the CNN classifier and 50% accuracy for testing the model with object detection.
Haoran yu
Abstract
The emerging and revolutionary technology called Internet of Things (IoT), presenting the future of computing, communication, and network, has made a number of tough jobs easier with the help of Internet, sensor, and embedded systems. Agriculture is said to be the backbone of Indian Economy and is of ...
Read More
The emerging and revolutionary technology called Internet of Things (IoT), presenting the future of computing, communication, and network, has made a number of tough jobs easier with the help of Internet, sensor, and embedded systems. Agriculture is said to be the backbone of Indian Economy and is of utmost importance in the present scenario. Today’s agriculture is data-centered, precise, and smarter than ever. The research paper explores the various issue and challenges which are vital in the field of smart agriculture using IoT devices. The paper also highlights the importance and usefulness of wireless network and other related terminology in this area. The paper explores the various advances in the field of smart agriculture, IoT, and wireless network and draws attention to the various future research directions that the research community can take to further improve the system in terms of economics, operations, and technical feasibility.
Rita de Fátima Muniz; Badria Almaz Ali Yousif; Azadeh Shemshad
Abstract
In this paper named Internet of Things (IoT) based river water quality monitoring gives the outcome of Quality River of water by the advantage of various advanced techniques (IoT), Wireless Sensor Network (WSN). As part of this we have made the things to collect the data and transfer the data to the ...
Read More
In this paper named Internet of Things (IoT) based river water quality monitoring gives the outcome of Quality River of water by the advantage of various advanced techniques (IoT), Wireless Sensor Network (WSN). As part of this we have made the things to collect the data and transfer the data to the software that we have made. Then the data that we collect using various equipment and be analyzed using the software that we have designed. Other than that, the hardware of the system, data visualization, software, we automate the process of monitoring This water quality monitoring system has been the major issue and can be use the digital, intelligent, and effectively gives the quality of river water.
Zhang Hao
Abstract
Remote correspondence advancements are making new sensor capacities. The current advancements in the field of sensor networks are basic for ecological applications. Web of Internet of Things (IoT) permits associations among different gadgets with the capacity to trade and accumulate information. IoT ...
Read More
Remote correspondence advancements are making new sensor capacities. The current advancements in the field of sensor networks are basic for ecological applications. Web of Internet of Things (IoT) permits associations among different gadgets with the capacity to trade and accumulate information. IoT additionally stretches out its ability to ecological issues notwithstanding computerization industry by utilizing industry 4.0. As water is one of the fundamental necessities of human endurance, it is expected to consolidate some instrument to screen water quality opportunity to time. Around 40% of passing’s are caused because of defiled water on the planet. Subsequently, there is a need to guarantee supply of filtered drinking water for individuals both in urban areas and towns. Water Quality Monitoring (WQM) is a practical and proficient framework intended to screen drinking water quality which utilizes IoT innovation. In this paper, the proposed framework comprises of a few sensors to gauge different boundaries, for example, pH esteem, the turbidity in the water, level of water in the tank, temperature and mugginess of the encompassing air. And furthermore, the Microcontroller Unit (MCU) connected with these sensors and further handling is performed at Personal Computer (PC). The got information is shipped off the cloud by utilizing IoT based Think Speak application to screen the nature of the water.
Sheila Maria Muniz
Abstract
Agriculture is the primitive and crucial occupation for the people. Smart Agriculture (SA) is an emerging concept, because IOT sensors are capable of providing information about agriculture fields and then act upon based on the user input. Urbanization, which indirectly affected the lives of people in ...
Read More
Agriculture is the primitive and crucial occupation for the people. Smart Agriculture (SA) is an emerging concept, because IOT sensors are capable of providing information about agriculture fields and then act upon based on the user input. Urbanization, which indirectly affected the lives of people in the agricultural sector by increasing level of environmental pollution, climate change, degradation of soil and water quality, increasing population, decreasing income from the farming industry, etc. In this Paper, it is proposed to develop a SA System that uses advantages of cutting-edge technologies such as Arduino, IOT and Wireless Sensor Network (WSN). Internet of Things (IoT)-based smart sensors is the new technique for the SA system. IoT-based SA system consists of various sensor nodes placed in different locations, internet service, smart remote devices, or computer systems with the internet that monitor the operation of sensor nodes, Wi-Fi, a camera with a microcontroller, and different interfacing sensing nodes for service. The system has a duplex communication link based on a cellular-Internet interface that allows for data inspection and irrigation scheduling to be programmed through an android application.
Chenguang Wang
Abstract
Humanity is currently experiencing one of the short periods of transition thanks to novel sensing solutions for smart cities that bring the future to today. Overpopulation of cities demands the development of solid strategic planning that uses infrastructure, innovation, and technology to adapt to rapid ...
Read More
Humanity is currently experiencing one of the short periods of transition thanks to novel sensing solutions for smart cities that bring the future to today. Overpopulation of cities demands the development of solid strategic planning that uses infrastructure, innovation, and technology to adapt to rapid changes. To improve mobility in cities with a larger and larger vehicle fleet, a novel sensing solution that is the cornerstone of a smart parking system, the smart vehicular presence sensor (SPIN-V, in its Spanish abbreviation), is presented. The SPIN-V is composed of a small single-board computer, distance sensor, camera, LED indicator, buzzer, and battery and devoted to obtain the status of a parking space. This smart mobility project involves three main elements, namely the SPIN-V, a mobile application, and a monitoring center, working together to monitor, control, process, and display the parking space information in real-time to the drivers. In addition, the design and implementation of the three elements of the complete architecture are presented.
Laxmi Rathour; Dragan Obradovic; Shiv Kant Tiwari; Lakshmi Narayan Mishra; Vishnu Narayan Mishra
Abstract
Trigonometry is a part of mathematics which deals with specific functions of angles and their application, and it is studies of the dependence between the sides and angles of a triangle. The word trigonometry is associated the operations between the sides and angles of the triangles. Initially, it aimed ...
Read More
Trigonometry is a part of mathematics which deals with specific functions of angles and their application, and it is studies of the dependence between the sides and angles of a triangle. The word trigonometry is associated the operations between the sides and angles of the triangles. Initially, it aimed to calculate the values of all elements of a triangle (height, centroid length, bisector, radius, area and angles) using data sufficient to determine the triangle. In the paper, trigonometric functions are defined, and some statements about trigonometric identities are stated and proved.
Samira Torabi
Abstract
Nowadays, we know that wireless sensor networks are being widely applied in many fields of human life such as civil and military applications. Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics ...
Read More
Nowadays, we know that wireless sensor networks are being widely applied in many fields of human life such as civil and military applications. Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes. when applying the WSN in the real world we have to face many challenges such as security, storage due to its centralized server/client models. Although WSNs can bring a lot of benefits and conveniences. This paper discusses an in-depth survey of a blockchain-based approach for malicious node detection, an exhaustive examination of the integration of blockchain techniques with WSNs (BWSN), and insights into this novel concept.
Victoria Nozick
Abstract
The most energy consumption in smart domestic network is smart plugs because of an uninterrupted supply. Consequently, this studies article accommodates about home automation electricity management that indicates the balance strength consumption between the gadgets in a regular c program language period. ...
Read More
The most energy consumption in smart domestic network is smart plugs because of an uninterrupted supply. Consequently, this studies article accommodates about home automation electricity management that indicates the balance strength consumption between the gadgets in a regular c program language period. Also, this research article presents future project duties in protection troubles in smart home surroundings. Additionally, the belief for smart home surroundings focuses the Interoperability, Reliability, Integration of clever houses and term privacy in context, term safety and privacy vulnerabilities to smart domestic. The energy may be decreased in the direction of inexperienced surroundings. Furthermore, the studies paper is considering the evaluation of calculate the terrible outcomes in environment because of complete home automation system. While calculating these bad results, the life Cycle evaluation (LCA) ought to be in sum general. This study makes use of two analyses the strength intake for environment effect of home strength management device (HEMs). The research article discusses home automation gadget consumes the strength for special devices linked for smart home.
Natalja Osintsev
Abstract
Wireless Sensor Networks are considered to be among the most rapidly evolving technological domains thanks to the numerous benefits that their usage provides. As a result, from their first appearance until the present day, Wireless Sensor Networks have had a continuously growing range of applications. ...
Read More
Wireless Sensor Networks are considered to be among the most rapidly evolving technological domains thanks to the numerous benefits that their usage provides. As a result, from their first appearance until the present day, Wireless Sensor Networks have had a continuously growing range of applications. The purpose of this article is to provide an up-to-date presentation of both traditional and most recent applications of Wireless Sensor Networks and hopefully not only enable the comprehension of this scientific area but also facilitate the perception of novel applications. In order to achieve this goal, the main categories of applications of Wireless Sensor Networks are identified, and characteristic examples of them are studied. Their particular characteristics are explained, while their pros and cons are denoted. Next, a discussion on certain considerations that are related with each one of these specific categories takes place. Finally, concluding remarks are drawn.
Reza Rasinojehdehi; Seyyed Esmaeil Najafi
Abstract
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network. A robust network security strategy deploys various solutions to shield ...
Read More
Network security is paramount in safeguarding the integrity of computer networks and the data they host. The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network. A robust network security strategy deploys various solutions to shield data within networks, safeguarding both users and organizations from potential threats. This paper introduces a novel approach to evaluating computer network security using Data Envelopment Analysis (DEA), a mathematical method designed to measure the performance of Decision-Making Units (DMUs) employing identical inputs to yield identical outputs. We present a practical application of DEA to assess the security of 10 distinct networks, treating them as DMUs. The resulting performance measurements allow us to classify computer network security into four levels: "terribly insecure," "insecure," "safe," and "very safe. To optimize the discriminating power of DEA, we employ Principal Component Analysis (PCA) to reduce the number of inputs and outputs. It not only enhances the precision of our evaluation but also ensures that the number of DMUs remains well-suited to the analysis. As a rule of thumb, the number of DMUs should be at least three times larger than the sum of the numbers of inputs and outputs to maintain DEA's discriminating power. Through the combined application of DEA and PCA, this research contributes a comprehensive and efficient method for evaluating and classifying computer network security, providing valuable insights for enhancing overall network resilience against cyber threats.
Mehdi Radmanesh; Mohammad Javad Ebadi
Abstract
This paper presents a Localized Radial Basis Functions Collocation Method (LRBFCM) for numerically solving one and 2-dimensional Fractional Integral Equations (2D-FIEs). The LRBFCM approach decomposes the main problem into several local sub-problems of small sizes, effectively reducing the ill-conditioning ...
Read More
This paper presents a Localized Radial Basis Functions Collocation Method (LRBFCM) for numerically solving one and 2-dimensional Fractional Integral Equations (2D-FIEs). The LRBFCM approach decomposes the main problem into several local sub-problems of small sizes, effectively reducing the ill-conditioning of the overall problem. By employing the collocation approach and utilizing the strong form of the equation, the proposed method achieves efficiency. Additionally, the matrix operations only require the inversion of small-sized matrices, further contributing to the method's efficiency. To demonstrate the effectiveness of the LRBFCM, the paper provides test problems encompassing linear, nonlinear, Volterra, and Fredholm types of Fractional Integral Equations (FIEs). The numerical results showcase the efficiency of the proposed method, validating its performance in solving various types of FIEs.
Khatereh Bagherzadeh Asl
Abstract
Agriculture is the foundation of India and almost 70% of individuals in our nation rely upon agribusiness. The yield of horticulture ought to be expanded quickly to satisfy the food necessities of populace all through the world. Present day’s remote sensor organization (WSN) utilized for taking ...
Read More
Agriculture is the foundation of India and almost 70% of individuals in our nation rely upon agribusiness. The yield of horticulture ought to be expanded quickly to satisfy the food necessities of populace all through the world. Present day’s remote sensor organization (WSN) utilized for taking care of many on-going issues. Horticulture is one of the significant hotspots for every living thing. Yet, these days’ agribusiness crops are impacted because of numerous natural changes. WSN assists the rancher with creating the harvest with high amount and diminish the expense of yield. Agribusiness gets impacted by climatic change, ecological change, and cataclysmic event. Utilizing WSN the dirt and water the executives should be possible. To conquer this WSN takes significant job in the field of agribusiness. In horticulture WSN utilized for checking, estimating temperature, water system framework, estimating water supply, etc. Here remote sensors are utilized so the expense of execution is exceptionally low.
Aziza Algarni
Abstract
Parking a vehicle in dense traffic environments often leads to excessive driving time in search of free space, which leads to congestion and environmental pollution. Lack of guidance information about vacant parking spaces is one reason for inefficient parking behavior. Smart parking sensors and technologies ...
Read More
Parking a vehicle in dense traffic environments often leads to excessive driving time in search of free space, which leads to congestion and environmental pollution. Lack of guidance information about vacant parking spaces is one reason for inefficient parking behavior. Smart parking sensors and technologies facilitate the guidance of drivers to free parking spaces, thereby improving parking efficiency. Currently, no such sensors or technologies are used for the open parking lot. This study reviews the literature on the usage of smart parking sensors, technologies, and applications and evaluates their applicability to open parking lots. To develop smart parking applications for open parking lots, further research is needed in deep learning and multi-agent systems.
Soheil Azizi Borojerdi; Reza Rasinojehdehi; Seyed Esmaeil Najafi
Abstract
This study, conducted in Iran's pharmaceutical industry, investigates the development of cost-effectiveness capabilities, a vital component of operational capabilities. It presents five essential hypotheses contributing to these capabilities. Capable human resources, especially in crisis management related ...
Read More
This study, conducted in Iran's pharmaceutical industry, investigates the development of cost-effectiveness capabilities, a vital component of operational capabilities. It presents five essential hypotheses contributing to these capabilities. Capable human resources, especially in crisis management related to environmental obstacles like international sanctions, foster creativity and cost-effectiveness. Hardware and software infrastructure supports international collaborations, enhancing overall quality. Documentation, organizational knowledge, and capacity enhancement further contribute to cost-effectiveness capabilities. Effective operations management, standardized routines, and the emergence of new routines stimulate creativity and cost reduction. This research offers insights into the formation of cost-effectiveness capabilities and underscores the significance of internal resources, collaborations, and efficient management practices. While focused on Iran's pharmaceutical sector, the proposed model can serve as a valuable framework for studying influencing factors on cost-effectiveness capabilities in other industries and countries.
Shahram Fatemi
Abstract
In the current research, the dataset for conducting data mining calculations was generated based on a sample with 2,000 data, reports of the general manager of the textile industry of Iran's Ministry of Industry, Mine and Trade (information from 240 industrial units and 630 spinning and weaving units ...
Read More
In the current research, the dataset for conducting data mining calculations was generated based on a sample with 2,000 data, reports of the general manager of the textile industry of Iran's Ministry of Industry, Mine and Trade (information from 240 industrial units and 630 spinning and weaving units were collected), and textile industry plants in Borujerd as the place for implementing the plan between 2015 and 2019, a period 6 month each year. Due to extensive information from the textile industry (with the help of the Ministry of Industry, Mine and Trade), the current research is unique. Using IBM SPSS Modeler 18, the most significant results of datamining calculations to extract knowledge are as follows, which are arranged based on main predictors of the research: predicting models of "strategy innovation in net with data code (A5)" with the prediction wight of 0.34; "technology innovation in net with data code (A1)" with the prediction wight of 0.30; "work environment innovation in net with data code (A3)" with the prediction wight of 0.16; Quality innovation in net with data code (A4)" with the prediction wight of 0.15; "employe innovation in net with data code (A2)" with the prediction wight of 0.10 are utilized to accurately analyze preventive maintenance in interaction with production.
Payam Chiniforooshan; Dragan Marinkovic
Abstract
This paper deals with the single machine scheduling problem with sequence-dependent setup time and learning effect on processing time, where the objective is to minimize total earliness and tardiness of the jobs. A Mixed Integer Linear Programming (MILP) model capable of solving small-sized problems ...
Read More
This paper deals with the single machine scheduling problem with sequence-dependent setup time and learning effect on processing time, where the objective is to minimize total earliness and tardiness of the jobs. A Mixed Integer Linear Programming (MILP) model capable of solving small-sized problems is proposed to formulate this problem. In view of the NP-hard nature of the problem, the Hybrid Particle Swarm Optimization (HPSO) algorithm is proposed to solve the large-sized problems. In order to utilize Particle Swarm Optimization (PSO) to solve the scheduling problems, the proposed HPSO approach uses a random key representation to encode solutions, which can convert the job sequences to continuous position values. Also, the local search procedure is included within the HPSO to enhance the exploitation of the algorithm. The performance of the proposed HPSO is verified for small and medium-sized problems by comparing its results with the best solution obtained by the LINGO. In order to test the applicability of the proposed algorithm to solve large-sized problems, 120 instances are generated, and the results are compared with a Random Key Genetic Algorithm (RKGA). The results show the effectiveness of the proposed model and algorithm.
Haifa Alqahtani
Abstract
In Agricultural Fields there are different climate conditions, greenhouses parameters are important to monitored regulate the crop production, and we would like to make a automation system to trace down climate conditions at different locations. The Wireless Sensor Network (WSN) do the job to automate ...
Read More
In Agricultural Fields there are different climate conditions, greenhouses parameters are important to monitored regulate the crop production, and we would like to make a automation system to trace down climate conditions at different locations. The Wireless Sensor Network (WSN) do the job to automate and analyze the comparable parameters. We would like to develop a smartphone application and sensors used are electrochemical sensors, location sensors BeagleBone Controller and Various Sensors are Used.