The current research dealt with the presence of ornaments and jewelry since ancient times، which express the social، religious or emotional status of the person who adorns them، in addition to being distinguished by a distinct aesthetic and luxury، that is، in a sense closely related to the social and economic status of people، and we note that jewelry is considered a symbol of luxury and luxury، and hence The need to study luxury appeared in the design of ornaments and jewelry because it refers to the adornment elements that are made of metals and precious stones، which actually indicate signs of status or position that distinguish social classes from each other. The problem was identified by the following question: Determine th
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreWireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in
... Show MoreIn this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.
Transportation network could be considered as a function of the developmental level of the Iraq, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure.
The main theme of this search is to show the characteristics of the regional transportation network in Iraq and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this search tries to draw an imagination for the connection between network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure. This search aiming also to determine the nat
The basic analytical formula for particle-hole state densities is derived based on the non-Equidistant Spacing Model (non-ESM) for the single-particle level density (s.p.l.d.) dependence on particle excitation energy u. Two methods are illustrated in this work, the first depends on Taylor series expansion of the s.p.l.d. about u, while the second uses direct analytical derivation of the state density formula. This treatment is applied for a system composing from one kind of fermions and for uncorrected physical system. The important corrections due to Pauli blocking was added to the present formula. Analytical comparisons with the standard formulae for ESM are made and it is shown that the solution reduces to earlier formulae providing m
... Show MoreAs one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second ord
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show More