19 research outputs found

    A data estimation for failing nodes using fuzzy logic with integrated microcontroller in wireless sensor networks

    Get PDF
    Continuous data transmission in wireless sensor networks (WSNs) is one of the most important characteristics which makes sensors prone to failure. a backup strategy needs to co-exist with the infrastructure of the network to assure that no data is missing. The proposed system relies on a backup strategy of building a history file that stores all collected data from these nodes. This file is used later on by fuzzy logic to estimate missing data in case of failure. An easily programmable microcontroller unit is equipped with a data storage mechanism used as cost worthy storage media for these data. An error in estimation is calculated constantly and used for updating a reference “optimal table” that is used in the estimation of missing data. The error values also assure that the system doesn’t go into an incremental error state. This paper presents a system integrated of optimal data table, microcontroller, and fuzzy logic to estimate missing data of failing sensors. The adapted approach is guided by the minimum error calculated from previously collected data. Experimental findings show that the system has great potentials of continuing to function with a failing node, with very low processing capabilities and storage requirements

    Urban Sprawl Impact on Agricultural Lands in Irbid City, Jordan

    Get PDF
    Urban sprawl on agricultural lands is considered as one of the major problems that agricultural sector can face, especially in Irbid city. Irbid city, which is located at the north of Jordan, is one of the most important provinces in Jordan for the fertility of its soil. Most of its lands have clay soil which is suitable for cultivation of several crops. Unfortunately, the scenario of urban sprawl is continuing randomly and the percentage of agricultural land continues to decrease. This research article focuses on the agricultural lands of Irbid city and its districts, and how urban constructions will affect their areas based on statistics along the years from 1995 to 2015. In order to provide a solution to agricultural area exhaustion in Irbid governorate, this article suggests allowing adding additional floors to the current allowed floors in order to encourage vertical construction expansion rather than horizontal one.This study presents a simulation study steps to figure out the relationships between the growth of construction areas and the decline of agricultural lands. These relationships can be computed by using statistical techniques of correlation and regression analysis. Based on this analysis and computation, we tested the suggested solution, of adding more floors on the current allowed number of floors, by measuring the appropriate number of allowed floors at the same building that will delay agricultural area blocking for each Irbid district.  The simulation results indicate when each district of Irbid city will be blocked before and after using the additional floors, and possible achieved delay for each district is computed. The model indicates that one alternative to reserve the agricultural lands in Irbid city for the coming 40 years is to allow buildings to grow up more than 4 floors. Therefore, this research encourages vertical construction expansion rather than horizontal one, for the coming buildings. Keywords: Agricultural lands, Construction Area, Distributive Function, Population, Simulation Process, Urban Sprawl

    IoT Crawler with Behavior Analyzer at Fog layer for Detecting Malicious Nodes

    Get PDF
    The limitations in terms of power and processing in IoT (Internet of Things) nodes make nodes an easy prey for malicious attacks, thus threatening business and industry. Detecting malicious nodes before they trigger an attack is highly recommended. The paper introduces a special purpose IoT crawler that works as an inspector to catch malicious nodes. This crawler is deployed in the Fog layer to inherit its capabilities, and to be an intermediate connection between the things and the cloud computing nodes. The crawler collects data streams from IoT nodes, upon a priority criterion. A behavior analyzer, with a machine learning core, detects malicious nodes according to the extracted node behavior from the crawler collected data streams. The performance of the behavior analyzer was investigated using three machine learning algorithms: Adaboost, Random forest and Extra tree. The behavior analyzer produces better testing accuracy, for the tested data, when using Extra tree compared to Adaboost and Random forest; it achieved 98.3% testing accuracy with Extra tree

    A speech recognition model based on tri-phones for the Arabic language

    Get PDF
    One way to keep up a decent recognition of results- with increasing vocabulary- is the use of base units rather than words. This paper presents a Continuous Speech Large Vocabulary Recognition System-for Arabic, which is based on tri-phones. In order to train and test the system, a dictionary and a 39-dimensional Mel Frequency Cepstrum Coefficient (MFCC) feature vector was computed. The computations involve: Hamming Window, Fourier Transformation, Average Spectral Value (ASV), Logarithm of ASV, Normalized Energy, as well as, the first and second order time derivatives of 13-coefficients. A combination of a Hidden Markov Model and a Neural Network Approach was used in order to model the basic temporal nature of the speech signal. The results obtained by testing the recognizer system with 7841 tri-phones. 13-coefficients indicate accuracy level of 58%. 39-coeefficents indicates 62%. With Cepstrum Mean Normalization, there is an indication of 71%. With these small available data-only 620 sentences-these results are very encouraging

    Synergistic effects of various Her inhibitors in combination with IGF-1R, C-MET and Src targeting agents in breast cancer cell lines

    Get PDF
    Introduction: Overexpression of the receptor tyrosine kinase HER2 has been reported in around 25% of human breast cancers, usually indicating a poor prognosis. As a result, HER2 has become a popular target for therapy. However, despite recent advances in HER2 targeted therapy, many patients still experience primary and secondary resistance to such treatments. It is therefore important to understand the underlying mechanism of resistance and to develop more effective therapeutic interventions for breast cancer. Methods: The sensitivity of a panel of seven breast cancer cell lines to treatment with various types HER-family inhibitors alone, or in combination with a selection of other tyrosine kinase inhibitors (TKIs) or chemotherapeutic agents was determined using the Sulforhodamine B colorimetric assay. Receptor expression, cell-cycle distribution, cell signalling and cell migration were determined using flow cytometry, Western blot and Incucyte Zoom Live-Cell Analysis System respectively. Results: Overall, breast cancer cells were more sensitive to treatment with the irreversible pan-HER family inhibitors, particularly afatinib and neratinib, than treatment with the first-generation reversible inhibitors. Of three HER-2 overexpressing cell lines in this panel, SKBr3 and BT474 were highly sensitive to treatment with HER-family inhibitors (IC50s as low as 3 nM), while MDA-MB-453 was relatively resistant (lowest IC50 = 0.11 ÎĽM). When the HER-family inhibitors were combined with other agents such as NVP-AEW541 (an IGF-1R inhibitor), dasatinib (a Src inhibitor) or crizotinib (a c-Met/ALK inhibitor), such combination produced synergistic effects in some of the cell lines examined. Interestingly, co-targeting of Src and HER-family members in MDA-MB-453 cells led to synergistic growth inhibition, suggesting the importance of Src in mediating resistance to HER2-targeting agents. Finally, treatment with the irreversible HER family blockers and dasatinib were also most effective at inhibiting the migration of breast cancer cells. Conclusion: We concluded that the irreversible inhibitors of HER-family members are generally more effective at inhibiting growth, downstream signalling and migration compared with reversible inhibitors, and that combining HER-family inhibitors with other TKIs such as dasatinib may have therapeutic advantages in certain breast cancer subtypes and warrants further investigation

    Online Auction Web Site Simulation

    No full text
    Online auctions are a profitable, exciting, and dynamic part of electronic commerce. It behaves in a way, which does not match classical auction. This paper provides a simulation model of an online auction. It models an online auction that helps auction organizer in order to determine his needs of servers and site architecture
    corecore