Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and pollute the environment. Emergency messages notify the drivers about road accidents and congestions, and how to avoid the dangerous zones. This paper classifies the emergency messages schemes into three categories based on relay node, clustering and infrastructure. The capabilities and limitations of the emergency messages schemes are investigated in terms of dissemination process, message forward techniques, road awareness and performance metrics. Moreover, it highlights VANET-based challenges and open research problems to provide the solutions for a safer, more efficient and sustainable future ITS.
With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the
... Show MoreIn this paper, we define the bg**-connected space and study the relation between this space and other kinds of connected spaces .Also we study some types of continuous functions and study the relation among (connected space, b-connected space, bg-connected space and bg**-connected space) under these types of continuous functions.
Fibrewise topological spaces theory is a relatively new branch of mathematics, less than three decades old, arisen from algebraic topology. It is a highly useful tool and played a pivotal role in homotopy theory. Fibrewise topological spaces theory has a broad range of applications in many sorts of mathematical study such as Lie groups, differential geometry and dynamical systems theory. Moreover, one of the main objects, which is considered in fibrewise topological spaces theory is connectedness. In this regard, we of the present study introduce the concept of connected fibrewise topological spaces and study their main results.
In this paper, the concept of semi-?-open set will be used to define a new kind of strongly connectedness on a topological subspace namely "semi-?-connectedness". Moreover, we prove that semi-?-connectedness property is a topological property and give an example to show that semi-?-connectedness property is not a hereditary property. Also, we prove thate semi-?-irresolute image of a semi-?-connected space is a semi-?-connected space.
The main objective of the central bank is to achieve price stability and target in fractionates. Therefore, the bank sought to use modern tools and policies in order to reduce the negative effects of the accumulation of foreign reserves represented by monetary sterilization, similar to developed and developing countries alike, but with different available tools that are possible and imposed by the local financial and monetary environments, such as the window for buying and selling foreign currency, open market operations and deposit facilities. And lending existing. Because any in crease in the monetary base resulting from the accumulation of foreign reserves will affect price stability directly due to the consumer nature of the
... Show MoreThe hiding of information has become of great importance in recent times. With dissemination through the internet, and communication through satellites, information needs to be secure. Therefore, a new algorithm is proposed that enables secret messages to be embedded inside satellite images, wherein images of any size or format can be hidden, using a system’s image compression techniques. This operation is executed in three main steps: first phase – the original image is converted into a raster image; second phase– steganography, in which a binary secret message is hidden inside a raster image, using a 4×4 array as the secret key; and third phase– compre
... Show MoreThe success of any media work in our contemporary life is based on proper planning. Television in Iraq is like any media outlet that adopts clear planning and programming in order to achieve the goals set in the news, entertainment, education. Iraq TV relies on four programming plans in one year (short term), but we often receive central instructions directly from the Minister of Information ordering to cancel the program plan and what was scheduled for broadcast to be finally replaced by alternative or emergency program associated with an incident, occasion or important news, these programs are all called (emergency programs).
In this present research we will be dealing with these programs as well as the extent of their impact o
... Show MoreIn this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliab
... Show MoreDue to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves. The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five kinetic models, the Hyperbolic diffusion model, Power low model, the First order reaction model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result
... Show MoreBackground: The purpose of this study was to evaluate and compare centering ability and canal transportation of simulated S-shaped canals instrumented with four different types of rotary nickel-titanium systems. Materials and Methods: Forty simulated S-shaped canals in resin blocks were divided into four groups of ten each and were instrumented to an apical size 25 by different instrumentation technique using ProTaper Universal files (group A), ProTaperNext (group B), Reciproc (group C) and WaveOne (group D).Centering ability and canal transportation was measured at (11) measuring points from D0 to D10 bysuperimposion of the pre- and post-operative images obtained by using digital camera in standardized manner. An assessment of the canals
... Show More