• Title/Summary/Keyword: border

Search Result 1,869, Processing Time 0.024 seconds

Enhanced Hybrid Routing Protocol for Load Balancing in WSN Using Mobile Sink Node

  • Kaur, Rajwinder;Shergi, Gurleen Kaur
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.3
    • /
    • pp.268-277
    • /
    • 2016
  • Load balancing is a significant technique to prolong a network's lifetime in sensor network. This paper introduces a hybrid approach named as Load Distributing Hybrid Routing Protocol (LDHRP) composed with a border node routing protocol (BDRP) and greedy forwarding (GF) strategy which will make the routing effective, especially in mobility scenarios. In an existing solution, because of the high network complexity, the data delivery latency increases. To overcome this limitation, a new approach is proposed in which the source node transmits the data to its respective destination via border nodes or greedily until the complete data is transmitted. In this way, the whole load of a network is evenly distributed among the participating nodes. However, border node is mainly responsible in aggregating data from the source and further forwards it to mobile sink; so there will be fewer chances of energy expenditure in the network. In addition to this, number of hop counts while transmitting the data will be reduced as compared to the existing solutions HRLBP and ZRP. From the simulation results, we conclude that proposed approach outperforms well than existing solutions in terms including end-to-end delay, packet loss rate and so on and thus guarantees enhancement in lifetime.

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

Scapegoats and Bastards of Manifest Destiny in the U.S.-Mexico Borderlands: Cormac McCarthy's Blood Meridian Revisited (국경의 틈새에서 '명백한 운명'을 욕망한 희생양과 사생아 -코맥 매카시의 『핏빛 자오선』 다시 읽기)

  • Kim, Junyon
    • Journal of English Language & Literature
    • /
    • v.57 no.4
    • /
    • pp.599-624
    • /
    • 2011
  • Cormac McCarthy's Blood Meridian (and the Border Trilogy) can be used as a touchstone with which the limit of American literature is tested. For his text is particularly significant in the sense that its language mixes English with Spanish; its characterization confronts Americans with non-Americans; and its narrative structure traverses the geographical and symbolic borderlands between America and Mexico. In this sense, his novels deserve to be reexamined under the rubric of Chicano/a Studies, Hemispheric American Studies, transnationalism, etc. Rereading McCarthy's Blood Meridian, this paper attempts to rethink its historical complexity in relation to Manifest Destiny, focusing on the border-crossing motifs of filibustering and scalp-hunting. For this purpose, I pay due and careful attention to the ways in which the ideology of Manifest Destiny was created, circulated, and manipulated among the 19th century American expansionists and border-crossing agents. Of course, my discussion does not omit the significance of the U.S.-Mexico borderlands in the contemporary Chicano/a Studies and Hemispheric American Studies. In these historical and interdisciplinary contexts, I investigate how the 19th century filibusters like Captain Smith and his followers fall prey to the imperial practice of Manifest Destiny. I would also interrogate whether and how the Glanton Gang's scalp trade is involved in the capitalist desire of Manifest Destiny.

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

Scalloped border as a possible diagnostic aid for differentiating jaw lesions: A pictorial essay

  • Mortazavi, Hamed;Baharvand, Maryam;Safi, Yaser
    • Imaging Science in Dentistry
    • /
    • v.52 no.3
    • /
    • pp.309-317
    • /
    • 2022
  • Purpose: The aim of this study was to introduce a category of jaw lesions comprising cysts and tumors associated with scalloped borders. Materials and Methods: General search engines and specialized databases including Google Scholar, PubMed, PubMed Central, and Scopus, as well as an authoritative textbook, were used to find relevant studies by using keywords such as "jaw lesion," "jaw disease," "scalloping," "scalloped border," "scalloped margin," "irregular border," and "irregular margin." Out of 289 articles, 252 records were removed because they were duplicates, did not have a relevant title, or did not mention the frequency of findings described using the term "scalloped border." Finally, 37 closely related articles were chosen. Results: According to the relevant literature, scalloped borders are found most frequently in ameloblastoma, followed by simple bone cyst, central giant cell granuloma, odontogenic keratocyst, and glandular odontogenic cyst. Conclusion: The lesions most frequently reported to have scalloped borders are ameloblastoma, central giant cell granuloma, odontogenic keratocyst, simple bone cyst, and glandular odontogenic cyst.

Political Economy of Cross-Border Lobbies and the Stringency of the Rules of Origin Verification (해외로비와 원산지규정 사후검증제도의 엄격성에 대한 정치경제학)

  • Seok-Joon Hwang;Uk Hwang;JinKwon Lee
    • Korea Trade Review
    • /
    • v.45 no.1
    • /
    • pp.155-171
    • /
    • 2020
  • In reality, there are numerous [Note: I advise to change the tone to being more certain, as opposed to offering a possibility. You need to emphasize the seriousness of the conditions that your study wants to talk about] non-tariff trade barriers under free trade agreements, with various stakeholders having different trade-off interests. This study focuses on the rules of origin verification and considers cases in which domestic firms, foreign firms, and domestic consumer groups compete politically for their rent protection in the domestic market. As in Gwande et al. (2006), cross-border lobbies are considered possible wherein foreign firms also lobby the government to influence the decision-making process of how stringently to verify the rules of origin. [Note: Starting here, switch to past tense because a: study intentions above can be in present tense, b: study procedures should be in past tense] In this study, we assumed that all stakeholders form interest groups and present political contributions to the government based on their interests. The stringency of the rules of origin verification was then determined through this political process, and we compared this to a socially optimal one in the analysis. It was found that the verification was less stringent when there was cross-border lobbying than the socially optimal one.

Recording maximal intercuspation and border positions of the mandible with intraoral scanner using the acquisition software's multi-occlusion function

  • Noha Morsy;Ihab Hammad
    • The Journal of Advanced Prosthodontics
    • /
    • v.16 no.4
    • /
    • pp.221-230
    • /
    • 2024
  • PURPOSE. This in vitro study was conducted to investigate the accuracy of intraoral scanner (IOS) for recording maximal intercuspal position (MIP) and border positions of the mandible. MATERIALS AND METHODS. Maxillary and mandibular master casts were articulated in MIP, protrusive, and lateral interocclusal position sequentially on a semi-adjustable articulator. For each articulation relation, sites of occlusal contacts (SOCs) and sites of clearance (SCs) were identified on the master casts with articulating paper (reference sites). IOS was used to take full arch scans and nine virtual interocclusal records (VIRs) for virtual articulation of models. Virtual SOCs and SCs were detected with 3D processing software and compared to those identified with the articulating paper. Sensitivity, specificity, positive predictive value (PPV), and negative predictive value (NPV) were calculated for each articulation relation. RESULTS. For MIP, IOS showed adequate sensitivity and NPV of 100%, and specificity and a PPV of 99%. For protrusive position, the IOS showed a sensitivity and a NPV of 100%, a high PPV of 86%, and a specificity of 83%. For lateral positions, the specificity and the PPV were high (93% and 79%, respectively), but the sensitivity and the NPV were below the clinically acceptable limits (28% and 56%, respectively). CONCLUSION. IOS displayed clinically acceptable accuracy for recording MIP and protrusive border mandibular position. However, IOS had less accuracy for lateral border mandibular position.

A Study on the Border Signal-fire In Eastern Sea (조선시대 동해안지역 연변봉수에 관한 연구)

  • Lee, Chul-Young;Kim, Seong-Chul
    • Journal of architectural history
    • /
    • v.17 no.2
    • /
    • pp.47-66
    • /
    • 2008
  • This research was to analyze the border signal-fire which is the main facility of military protective duty for safety of sea side in chosun dynasty. The results of this research were described separately as follows. 1. Five types of site plan of signal-fire were observed, which is circle, half-circle, oval, round-rectangular. The majorities were circle type in eastern area. 2. Plan configuration of signal-fire stand which is separated with circle, rectangular type roughly was constructed with circle type generally. The height of signal-fire stand was about $2{\sim}3m$. The diameter of signal-fire stand was $8{\sim}10m$. Building base that protect ground moisture and infilteration of rainfall was found in 9 border singal-fire, the height of it was about $0.3m{\sim}2.5m$. 3. Trench was mainly circle type and average width was $3{\sim}4m$. However the depth was almost observed as 1m, originally, it was estimated it has more depth. 4. The height of protective wall remained until present was about 1m, the depth was about average 2.5m. 5. The storage of border signal-fire has rectangular dimension, several types of $1.8{\times}1.2m{\sim}5.7{\times}4.4m$, square(間) of $1{\times}1{\sim}2{\times}1$. The building material was stone and located below or near the signal-fire stand.

  • PDF

A RADIOGRAPHIC STUDY OF MANDIBULAR CANAL (하악관에 관한 방사선학적 연구)

  • Kim Won Chull;Lee Sang Rae
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.17 no.1
    • /
    • pp.209-222
    • /
    • 1987
  • The author invested the gonial angle, the angle of mandibular and mental canal to the lower border of the mandible, and a relationship of the position of the mandibular canal to the root apex of the posterior teeth and the cortical plate of the lower of the mandible. The materials consisted of 458 pantomograms in male and female aged 11-40 and divided into 5 groups at 5 year intervals and subdivided into 3 groups by gonial angle. The results were as follows; 1. The gonial angle decreased with age, but slight increase occurred over 26-30 years. 2. The average angle of the mandibular canal to the lower border of the mandible was 151.6° and did not correlate with age. 3. The average angle of the mental canal to the lower border of the mandible was 36.9° and didn't correlate with age. 4. The angles of mandibular and mental canal to the lower border of the mandible correlated with gonial angle. 5. The distance from the root apex of the posterior teeth to the upper wall of the mandibular canal was most short at the region of the distal root of the mandibular second molar and increased with age at the region of the mandibular second molar. 6. The distance from the lower wall of the mandibular canal to the cortical plate of the lower border of the mandible was most short at the region of the mesial root of the mandibular first molar and didn't correlate with age.

  • PDF

k-NN Query Processing Algorithm based on the Matrix of Shortest Distances between Border-point of Voronoi Diagram (보로노이 다이어그램의 경계지점 최소거리 행렬 기반 k-최근접점 탐색 알고리즘)

  • Um, Jung-Ho;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.105-114
    • /
    • 2009
  • Recently, location-based services which provides k nearest POIs, e.g., gas stations, restaurants and banks, are essential such applications as telematics, ITS(Intelligent Transport Systems) and kiosk. For this, the Voronoi Diagram k-NN(Nearest Neighbor) search algorithm has been proposed. It retrieves k-NNs by using a file storing pre-computed network distances of POIs in Voronoi diagram. However, this algorithm causes the cost problem when expanding a Voronoi diagram. Therefore, in this paper, we propose an algorithm which generates a matrix of the shortest distance between border points of a Voronoi diagram. The shortest distance is measured each border point to all of the rest border points of a Voronoi Diagram. To retrieve desired k nearest POIs, we also propose a k-NN search algorithm using the matrix of the shortest distance. The proposed algorithms can m inim ize the cost of expanding the Voronoi diagram by accessing the pre-computed matrix of the shortest distances between border points. In addition, we show that the proposed algorithm has better performance in terms of retrieval time, compared with existing works.

  • PDF