Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and pollute the environment. Emergency messages notify the drivers about road accidents and congestions, and how to avoid the dangerous zones. This paper classifies the emergency messages schemes into three categories based on relay node, clustering and infrastructure. The capabilities and limitations of the emergency messages schemes are investigated in terms of dissemination process, message forward techniques, road awareness and performance metrics. Moreover, it highlights VANET-based challenges and open research problems to provide the solutions for a safer, more efficient and sustainable future ITS.
Sickle cell disease (SCD) is a hereditary ailment that can cause severe pain and suffering to people who are affected. However, with continued investment in research and treatment options, we can make progress towards improving the lives of those with SCD. Over 40% of patients experience painful vaso-occlusive crises (VOCs), so we must work towards finding solutions and providing support for those living with this condition, These episodes, a hallmark of SCD, significantly contribute to morbidity, mortality, and a diminished quality of life, while also incurring substantial healthcare costs. Chronic pain particularly affects older adolescents and adults with SCD, with over half reporting daily discomfort. Opioid-based analgesics, though sti
... Show MoreStereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA type b
... Show MoreStereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA t
... Show MoreThis study estimated seven heavy metals (Fe, Cu, Zn, Pb, Ni, Cd, Cr) in water (dissolved and particulate phase), sediments and some aquatic organisms including two species from aquatic plants (Ceratophyllum demersum&Phragmites australis); one species of clam (Psedontopeses euphratics) and two species from fish (Oreochromis aureus& Leuciscus vorax)in four sites within Mashroo AL- Musayyib channel project/ branch of Euphrates river, Babylon , medial of Iraq . This aims to show the concentration of these elements, their fate and the mechanisms of their transmission through the food chain in this lotic aquatic system ; also in addition to examining some physicochemical properties of ri
... Show MoreObjective (s): To determine factors associated with the pregnancy complications (Maternal age, education,
obstetrical history, gravidity, birth space interval, and smoking).
Methodology: A cross-sectional study conducted at Al- washash & Bab-almoadham primary health care
centers. The sample was (non probability convenient sample) which included (550) pregnant women. The
study started from 1st April 2014 to 1
st of April 2015. The data was collected by direct interview using
special questionnaire to obtain socio-demographic information.
Results: the result shows that mean age of the subjects was 26.5± 4.39 years, 57.8% were housewives, the
sample included 103 premature uterine contractions, 98 pregnancy induce
Herein, we report designing a new Δ (delta‐shaped) proton sponge base of 4,12‐dihydrogen‐4,8,12‐triazatriangulene (compound
This paper studies the main characteristics of the traditional urban configuration of Arab cities, as an important built heritage, discussing the approach adopted with such configuration at the local level, and examines its ability to preserve the character of the city, as well as, its responsiveness to the recent requirements of its society that constantly change; in order to reach the appropriate procedures to deal with the traditional urban configuration of the Iraqi city to achieve a vital cultural communication with the vernacular built heritage, by dealing with the Form-Moral Values structure. Due to its importance within other traditional Iraqi cities, the research chose Al-Kadhimiya as a case study, so it discusses and compares
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More