There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreIn this study a concentration of uranium was measured for twenty two samples of soil distributed in many regions (algolan, almoalmeen, alaskary and nasal streets) from Falluja Cityin AL-Anbar Governorate in addition to other region (alandlos street) as a back ground on the Falluja City that there is no military operations happened on it. The uranium concentrations in soil samples measured by using fission tracks registration in (PM-355) track detector that caused by the bombardment of (U) with thermal neutrons from (241Am-Be) neutron source that has flux of (5×103n cm-2 s-1). The concentrations values were calculated by a comparison with standard samples. The results shows that the uranium concentrations algolan street varies from(1.
... Show MoreCloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreWith the shift of narration and the revolution against the traditional methods which were dominated by the authorial intrusion and the single narrative voice, there appeared new forms that go along with the change in methods of narration. Form becomes the representation which equips us to understand more fully aspects of existence outside of art. Form is the objectifying of idea, and its excellence depends upon its appropriateness to the idea.1 One of the most important approaches to writing fiction is the power of point of view.
In the strategy of 'point of view' lies the secret of art and, as Norman Friedman indicates, it provides a method for distinguishing the possible degrees of authorial extinction in the narrati
... Show MoreThe aim of the research was to investigate the use of non-parametric tests in the analysis of the questionnaire and how to choose the appropriate test for testing the hypothesis of the study of crime motives in Khartoum State. The data were collected through the primary sources by designing a questionnaire and distributed to a sample of inmates in Khartoum state; the data were analysis by SPSS program using the analytical statistical method through using some of the suitable non-parametric tests for each case. The most important results of the research were: there was significant relationship between the type of crime and the age group therefore, we found that the age group (20-29) was the most frequent crime particularly, the fi
... Show MoreOwing to their cost-effectiveness and the natural abundance of magnesium, magnesium-ion batteries (MIBs) were introduced as encouraging alternatives to Lithium-ion batteries. Following the successful synthesis of carbon nano-tube, its B and N doped derivatives which were doped with B and N enjoyed the attention of researchers as novel anode materials (AM) for MIBs. Here, we investigated a BC2N nano-tube (BC2NNT) as an encouraging AM for MIBs. To have a deeper understanding of the electrochemical properties, cycling stability, specific capacity (SC) and the adsorption behavior of this nano-tube, first-principles density functional theory computations were performed. By performing NMR calculations, we identified two types of non-aromatic hexa
... Show MoreThis work presents a novel technique for the detection of oil aging in electrical transformers using a single mode optical fiber sensor based on surface plasmon resonance (SPR). The aging of insulating oil is a critical issue in the maintenance and performance of electrical transformers, as it can lead to reduce insulation properties, increase risk of electrical breakdown, and decrease operational lifespan. Many parameters are calculated in this study in order to examine the efficiency of this sensor like sensitivity (S), signal to noise ratio (SNR), resolution (refractive index unit) and figure of merit (FOM) and the values are for figure of merit is 11.05, the signal to noise ratio is 20.3, the sensitivity is 6.63, and the resolution is 3
... Show More