The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Reference Point Group Model) and MGM (Manhattan Grid Model) mobility models above CBR traffic sources. The results of Reference Point Group Model simulation illuminate that routing protocol performance is best with RPG mobility model than other models.
The subject of dumping is considering today one of the subjects in which form an obstruction arise in front of the cycle of growth for some countries , such as the study of dumping is capturing a large attention by the competent because either a big role and effect in growing the economies of nations then the subject of dumping became a field turn around its sides many measures and laws … and may be done resorting to by many states of the world to anti-dumping as approach of determent weapon delimit the impact of dumping and gives the national agriculture sector the opportunity for rising and growing so this section of international economics is capturing a special importance and represent in same time an important
... Show MoreA new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.
In light of the rapid changes in the business environment and the entry of administrative leaders in the challenges of the atheist and twenty- increasing competition between sectors and the desire to acquire the skills, the traditional methods are no longer viable, which requires doing evaluates performance according to a more holistic, rather than limiting the performance evaluation on the financial hub that has not longer enough alone, as well as benchmarking method that has proven successful in developed countries as a way to develop and improve products and services.
I've touched your search to the development of indicators evaluating the performance and preparation of a mechanism for making comparisons of reference between o
... Show MoreSensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar
... Show More
The objective of this study was to develop neural network algorithm, (Multilayer Perceptron), based correlations for the prediction overall volumetric mass-transfer coefficient (kLa), in slurry bubble column for gas-liquid-solid systems. The Multilayer Perceptron is a novel technique based on the feature generation approach using back propagation neural network. Measurements of overall volumetric mass transfer coefficient were made with the air - Water, air - Glycerin and air - Alcohol systems as the liquid phase in bubble column of 0.15 m diameter. For operation with gas velocity in the range 0-20 cm/sec, the overall volumetric mass transfer coefficient was found to decrease w
... Show MoreObjective: study aims to identify the diabetes type2 clients self management skills toward dietary pattern
, and find out the relationship between variables which are (Age, gender, educational level, duration of DM
diagnosis, and monthly income) with diabetes type 2 clients self management skills toward dietary pattern
Methodology: descriptive study was carried out through the present investigation from January 2nd
2011to September 2nd 2011 in order to achieve the objectives of the present study. A non probability
(purposive) sample, (200) cases which consists of clients who were attending Al-Nasiriyha diabetic center.
Including (118) males and (82) females. The data were collected by utilization of the study instrument
Abstract
Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36% and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show More