Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10, 30 and 50 nodes, respectively using well known Network Simulator (NS-2.35). Moreover, Constant Bit Rate (CBR) considered as a traffic source and On-demand Distance Vector (AODV) as the routing protocol. For evaluation performance, QoS metrics such as end-to-end delay, packet delivery ratio, throughput and jitter are measured. The results show that delay and jitter of TFRC are slightly less than UDP and TCP whereas UDP has the significantly better performance wise throughput.
Background: The study aimed to investigate the effect of different techniques of en masse retraction on the vertical and sagittal position, axial inclination, rate of space closure, and type of movement of maxillary central incisor. Materials and methods: A typodont simulation system was used (CL II division 2 malocclusion). Three groups were used group 1(N=10, T-loop), group 2(N=10, Time-Saving loop), and group 3(N=10, Microimplant). Photographs were taken before and after retraction and measurements were made using Autodesk AutoCAD© software 2010. Kruskal-Wallis one-way analyses of variance and Mann-Whitney U test (p?0.05) were used. Results: The rate of space closure showed no significant difference among the three groups (p?0.05), whi
... Show MoreDetermination and evaluation of principal minerals in Negella sativa by atomic absorption technical methods were showed, using wet ashing method. This work was done on Negella sativa because of wide using of this plant in many formulations ( in food or medicine ).two types of atomic absorptions were used : first, flame atomic absorption spectroscopy, for minerals of high concentrations such as, Na, Mg, K, Fe, Ca, Li, Ni, Zn, Mn, Cu. Second, flameless atomic absorption spectroscopy, for minerals of low concentrations such as, Al, Si, V, B, Pb, Co, Cd, Cr ,Si, Hg, Sn .The results showed the existence of many minerals in Negella sativa useful to human sanity with acceptable dietary allowance. On other side, the presence of harmful m
... Show MoreBackground: Irrigation has a central role in endodontic treatment. Several irrigating solutions have the antimicrobial activity and actively kill bacteria and yeasts when introduced in direct contact with the microorganisms. The purpose of this study was to evaluate the antimicrobial effectiveness of Dandelion (Taraxacum officinale) root and leaf extracts as possible irrigant solutions, used during endodontic treatments, and both were compared to Sodium hypochlorite, Propolis and Ethyl alcohol. Materials and Method: Forty seven human extracted single rooted teeth were selected. The teeth were decoronated using a diamond disk to have a length of 15 mm ±1 mm and they were instrumented using the hybrid technique. All roots were sterilized
... Show MoreAbstract: The use of indirect, all-ceramic restorations has grown in popularity among dentists. Studies have demonstrated that for indirect ceramic restorations to be effective over time, cement and ceramic must be bonded in a stable manner. Chemical, mechanical, and laser irradiation are among the methods used to precondition ceramic surfaces in order to increase bond strength.The objective of the study: This study was performed to investigate the roughness values and surface topography of lithium disilicate glass-ceramic treated with conventional methods and different Er,Cr:YSGG, and fractional CO2 laser conditioning parameters.Material and methods:<
... Show MoreBackground: Studies discussing the correlation between biochemical markers of bone turnover and the diagnosis of osteoporosis in postmenopausal Iraqi women are rare. This study is devoted to find out the significance of serum osteocalcin (OC) and osteopontin (OPN) levels with the incidence of osteoporosis and its major complication (fracture).Objectives: to investigate the significance of bone turnover biochemical markers; serum osteocalcin and serum osteopontin in evaluating osteoporosis for postmenopausal Iraqi women with and without history of vertebral fracture, as well as to explore the relationship of these markers with bone mineral density (BMD).Methods: Fifty seven postmenopausal women whose ages are fifty years old and over, cat
... Show MoreThe evacuated tube solar collector ETC is studied intensively and extensively by experimental and
theoretical works, in order to investigate its performance and enhancement of heat transfer, for Baghdad climate
from April 2011 till the end of March 2012. Experimental work is carried out on a well instrumented collector
consists of 16 evacuated tubes of aspect ratio 38.6 and thermally insulated tank of volume 112L. The relation
between convective heat transfer and natural circulation inside the tube is estimated, collector efficiency, effect of
tube tilt angles, incidence angle modifier, The solar heating system is investigated under different loads pattern (i.e
closed and open flow) to evaluate the heat loss coefficient
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More