944 research outputs found

    Distributed and adaptive location identification system for mobile devices

    Full text link
    Indoor location identification and navigation need to be as simple, seamless, and ubiquitous as its outdoor GPS-based counterpart is. It would be of great convenience to the mobile user to be able to continue navigating seamlessly as he or she moves from a GPS-clear outdoor environment into an indoor environment or a GPS-obstructed outdoor environment such as a tunnel or forest. Existing infrastructure-based indoor localization systems lack such capability, on top of potentially facing several critical technical challenges such as increased cost of installation, centralization, lack of reliability, poor localization accuracy, poor adaptation to the dynamics of the surrounding environment, latency, system-level and computational complexities, repetitive labor-intensive parameter tuning, and user privacy. To this end, this paper presents a novel mechanism with the potential to overcome most (if not all) of the abovementioned challenges. The proposed mechanism is simple, distributed, adaptive, collaborative, and cost-effective. Based on the proposed algorithm, a mobile blind device can potentially utilize, as GPS-like reference nodes, either in-range location-aware compatible mobile devices or preinstalled low-cost infrastructure-less location-aware beacon nodes. The proposed approach is model-based and calibration-free that uses the received signal strength to periodically and collaboratively measure and update the radio frequency characteristics of the operating environment to estimate the distances to the reference nodes. Trilateration is then used by the blind device to identify its own location, similar to that used in the GPS-based system. Simulation and empirical testing ascertained that the proposed approach can potentially be the core of future indoor and GPS-obstructed environments

    Comparative morphometric study of shank bone in the tom (Meleagris gallopavo) and local cock (Gallus banikaval)

    Get PDF
    The study was carried out on 20 legs of ten adult clinically and healthy local and Tom were obtained from Mosul local market, were divided into three groups; the first and second groups were subjected to gross feature regarding to shape, position, relationship of tibiotarsal and fibula in both birds also the length and diameters of shank bone while third group study morphological of muscles, blood and nerve supply of leg. The purpose of this study, this part of the limb is popularly known as the (drum stick), the bird in lowering its body flexes knee and hock joints and this passively tenses these tendons of leg which clamp the digits about the perch, and that is the much longer than the femur and, in spite of importance study to parameters of leg are more economic to choose breed of fertilization depend on the measurement, the outcome of this investigation may served as a guide for successful study of domestic birds in Iraq. The results include in both birds, the leg is consist of tibia fuses with tarsal element, forming tibiotarsus and fiblula articulates with the femur that in contrast to mammals. In Tom the tibia has two cnemial crest in proximal extremity and the distal extremity has tendinal groove, but in local cock it has one cnemial crest of proximal extremity, and it has two tendinal groove in the distal extremity, while hock joint in the Tom and local cock is an intertarsal joint that unites the tibiotarsus with the tarsometatarsus but the stiff joint is similar to that seen in mammals. The mean length of tibiotarsal in Tom 17.99±0.44 cm and the mean length of tibiotarsal in local coke 11.74±0.31 cm, the mean diameter of tibiotarsal in Tom 3.02±0.0021 cm proximal part, 2.21±0.005 cm middle part, 1.94±0.0021 cm distal part, but the mean diameter of tibiotarsal in local coke 2.86±0.048 cm proximal part, 2.02±0.067 cm middle part, 1.51±0.0022 cm distal part. While the mean length of fibula in Tom 11.62±0.21 cm and the mean length of fibula in local coke 7.27±0.32 cm, the mean diameter of fibula in Tom 1.51±0.0021 cm proximal part, 0.81±0.0033 cm middle part, and 0.33±0.0043 cm the distal part,also the mean diameter of fibula in local coke 1.12±0.0025 cm proximal part, 0.51±0.007 cm middle part, and 0.23±0.0054 cm distal part. Tendon of muscles of shank bone in Tom generally ossification but remain that tendon in local cock. Also cranialis tibialis muscle has two head, femoral head is usually smaller than the tibial head and gastrocnimeus muscles is composed of three part into two birds which passes through the planter aspect of the tarsometatarsal joint, as soon as flexor digitorium muscle of both species can be grouped into three morphological level (superficial intermediate and deep), the muscles in turkey are very clearly distinguished are read deep color than it is rose color in local cock, blood, nerve supply and venous drainages of the shank bone in both birds by cranial tibial artery is passage with cranial tibial vein and common fibular nerve

    Psychological Impotence as a Predicting Variable of Bullying Behavior among a Sample of Adolescent Students in Jenin Camp

    Get PDF
    The study aimed to specify the degree of the relationship between psychological impotence and the bullying behavior  and to specify the contribution of the dimensions of psychological impotence in predicting bullying behavior among adolescent students in the Jenin Camp. To achieve this, the researcher used two measures prepared by her. The first measure is the measure of psychological impotence, and the second measure is the measure of bullying behavior. The tw measures were applied on a sample the size of which  was (112) adolescent students. After gathering the data and analyzing them, it was found that there is a  positive correlation between psychological impotence  and bullying behavior among adolescent students in the Jenin camp. It was also found that there is  a statistically significant contribution at the level of significance  (a>0.05) for the two dimensions of the impotence  in the social function and the studying performance in the physical bullying and the verbal bullying, and there was a statistically significant contribution in the social function in the social bullying. Key Words: Psychological impotence, Bullying behavior, Jenin Camp, Adolescent students.

    The impact of asset management on achieving bank profitability (Applied study within Al-Khaleej commercial bank)

    Get PDF
    Banking activity is essential in countries' economies, as banks are considered intermediate financial institutions between surplus and deficit. Bank managers work on achieving the main objectives of any bank, which are: (profitability, liquidity, and security) by balancing the management of assets and liabilities and avoiding risks that face their work, such as liquidity risks and credit risks, as asset management is concerned with choosing the optimal investment combination for available sources of funds, as the funds are utilized in a variety of ways to reduce risks and obtain profit. Maximizing the bank's profitability is the responsibility of the management, as maximizing profitability is a strategic goal for the bank, and it will contribute to expanding the bank's work and obtaining a larger market share. The research was based on the analysis of banking profitability indicators (income of assets, income of investment) and their impact on profitability. As asset management is the one factor that affects the returns of assets and acquisitions, and, in turn, bank profitability is concerned. Thus, asset management must invest money elaborately and keep risks at bay

    Vascular Smooth Muscle Cells and the Comparative Pathology of Atherosclerosis

    Get PDF

    WEB PROXY LOG TO DEVELOP A REQUIREMENT BASED RESOURCE ALLOCATION FOR WEB TRAFFIC

    Get PDF
    Network packets are busy exchanging information like data from human activities, machine (M2M communication), cellular network, Internet of Things (IoT), business and in many other forms. Network infrastructure plays the role of backbone in the whole communication system. Therefore, it is an integral point of interest not only to analyze network traffic but also to expose security incident or business critical event. The goal of this research is to discover unknown network parameters and event from the network logs, specifically from web proxy log, to explore the relationship between different parameters. This work highlights unique findings and relations among log parameters. For example, how server action varies with SC-byte or CS-byte or RS and relations between the time taken and RS (Content-Type). Furthermore, visualizing the busiest period in terms of bandwidth consumption and available number of live IP addresses, and so on

    Al-Jazeera Television: Intifada on the Air

    Get PDF
    The Doha-based, pan-Arab al-Jazeera Satellite Channel came to life on November 1, 1996 by a Qatari Emiri decree, and began a 24-hour operationon February 1, 1998. Although sponsored by an autocratic government that is similar to other Arab regimes in terms of the wide gap separating them fromtheir masses, al-Jazeera has become, and continues to be, the most popular and trusted news channel in the Arabworld. Media scholars and commentators agree that the popularity of al-Jazeera derives mainly fromits identification with the radicalism of the Arab public, as evidenced by the starkly anti-establishment tone characterizing much of the medium\u27s discourses. There is a disagreement, however, over the meaning and implications of the Channel\u27s anti-establishment discourses. Some argue that al-Jazeera is radicalizing the Arab audiences; others argue that it is moderating the beliefs of both of the Arab publicand the Arab regimes. Nottaking the Channel\u27s radical discourses literally, however, a third group of scholars and commentators argues that al-Jazeera isin line with other official mass media whose objective is to advance and defend the interests of the host-government. Al-Jazeera, then, may help perpetuate Arab autocracy. Alternatively, I argue that both the radicalizing- and moderating effect perspectives do not provide an accurate interpretation of the Channel\u27s anti-establishment discourses and their implications. I also contend that the third group\u27s argument has more credibility. However, whilethe proponents of the third argument tell us what al-Jazeera does, they rarely tell us how al-Jazeera does it. To answer this animating question, and in order to discern thetrue nature and motives of al-Jazeera\u27s political rhetoric, I offer a close reading of the Channel\u27s political discourses on issues that sharply divide theArab public from the Qatari government and other Arab regimes. Textual evidence indicates that by initially identifying itself with the viewers\u27 radicalism, al-Jazeera, indirectly, deflects such radicalism and channels it towards non-violent political ideologiesthat are conducive to the Qatari interests and policies. Furthermore, by indirectly connecting Qatar with the anti-establishment viewers, al-Jazeera re-invents Qatari autocracy depicting it as an acceptable form of governance

    A Novel Placement Algorithm for the Controllers Of the Virtual Networks (COVN) in SD-WAN with Multiple VNs

    Get PDF
    The escalation of communication demands and the emergence of new telecommunication concepts such as 5G cellular system and smart cities requires the consolidation of a flexible and manageable backbone network. These requirements motivated the researcher to come up with a new placement algorithm for the Controller of Virtual Network (COVN). This is because SDN and network virtualisation techniques (NFV and NV), are integrated to produce multiple virtual networks running on a single SD-WAN infrastructure, which serves the new backbone. One of the significant challenges of SD-WAN is determining the number and the locations of its controllers to optimise the network latency and reliability. This problem is fairly investigated and solved by several controller placement algorithms where the focus is only on physical controllers. The advent of the sliced SD-WAN produces a new challenge, which necessitates the SDWAN controllers (physical controller/hosted server) to run multiple instances of controllers (virtual controllers). Every virtual network is managed by its virtual controllers. This calls for an algorithm to determine the number and the positions of physical and virtual controllers of the multiple virtual SD-WANs. According to the literature review and to the best of the author knowledge, this problem is neither examined nor yet solved. To address this issue, the researcher designed a novel COVN placement algorithm to compute the controller placement of the physical controllers, then calculate the controller placement of every virtual SD-WAN independently, taking into consideration the controller placement of other virtual SD-WANs. COVN placement does not partition the SD-WAN when placing the physical controllers, unlike all previous placement algorithms. Instead, it identifies the nodes of the optimal reliability and latency to all switches of the network. Then, it partitions every VN separately to create its independent controller placement. COVN placement optimises the reliability and the latency according to the desired weights. It also maintains the load balancing and the optimal resources utilisation. Moreover, it supports the recovering of the controller failure. This novel algorithm is intensively evaluated using the produced COVN simulator and the developed Mininet emulator. The results indicate that COVN placement achieves the required optimisations mentioned above. Also, the implementations disclose that COVN placement can compute the controller placement for a large network ( 754 switches) in very small computation time (49.53 s). In addition, COVN placement is compared to POCO algorithm. The outcome reveals that COVN placement provides better reliability in about 30.76% and a bit higher latency in about 1.38%. Further, it surpasses POCO by constructing the balanced clusters according to the switch loads and offering the more efficient placement to recover controller-failure

    MCQ Exams Correction in an Offline Network Using XML

    Get PDF
    One of vital subject in education facility isstudent assesment. A common way used to compute there workis making exams. Generaly class sizes tend to expand in somesocities. As a result there is a trend to give a quick accurateevaluation which is become more demand. A computerizedquestions make the process of taking an exam easier andsomther. This caused the move towards the use of multiple-choicequestions (MCQ). The rapid progress of using XML (ExtensibleMarkup Language) for large amount of structured data, due toits ability of saving time and manipulate data makes it suitablefor MCQ exam environment. Moreover, XML manipulates anddeals with networks suffering from failure occurrences. Themain contribution of this paper is to present an efficient methodof transfer data related to online questions between the serverand clients stations without being affected if the connection failsduring taking the exam. An analytical study of the efficiency ofmodule is also presented
    corecore