Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and pollute the environment. Emergency messages notify the drivers about road accidents and congestions, and how to avoid the dangerous zones. This paper classifies the emergency messages schemes into three categories based on relay node, clustering and infrastructure. The capabilities and limitations of the emergency messages schemes are investigated in terms of dissemination process, message forward techniques, road awareness and performance metrics. Moreover, it highlights VANET-based challenges and open research problems to provide the solutions for a safer, more efficient and sustainable future ITS.
This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the s-plane. This has the effect
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreThis paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreDust and bird residue are problems impeding the operation of solar street lighting systems, especially in semi-desert areas, such as Iraq. The system in this paper was designed and developed locally using simple and inexpensive materials. The system runs automatically. It Connects to solar panels used in solar street lighting, and gets the required electricity from the same solar system. Solar panels are washed with dripping water in less than half a minute by this system. The cleaning period can also be controlled. It can also control, sensing the amount of dust the system operates. The impact of different types of falling dust on panels has also been studied. This was collected from different winds and studied their impact o
... Show Morethe pursue of social systems history present to us solid evidence that the collapse of that systems be caused by either the stagnancy aftermath maturity or unreal intellectual foundation which lead to sudden collapse, while the capitalism can avoided that intellectual damages due to its dynamic system with appropriate auto adaptation mechanism and use it excellently in the right time.
The globalization had excrete (as one of the capitalism adaptation mechanism) its own targets and its methods in framework of multinationals corporations which consist with capitalism states that employed the international organizations to reconstruction the global economy to serve such targets. So the glob
... Show MoreThe using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.
For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence
... Show MoreThis study deals with The Millstone (1965) which is a dramatic depiction of a single
mother heroine in a classic predicament. This novel is considered as representative of the age
in which it was written. The primary theme is her intense preoccupation with questions of
fatalism and will. The work also involves, both explicitly and implicitly, feminist concerns.
Because the central protagonist is a woman and the society in which she lives is depicted,
accurately, as deeply patriarchal and class-bound, the problem of the individual's capacity for
self-determination is inevitably tied to the feminist perspective.
This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
Abstract
The leases, are regarded as one of the most controversial accounting issues in recent years, since they represents one of the important sources of funding, which may be exploited by the tenant as off- Balance sheet Financing , which negatively affects the quality of financial reporting. The Financial Accounting Standards Board (FASB) and the International Accounting Standards Board (IASB) have "significant" interest in accounting for leases . FASB issued Statement of Financial Accounting Standards 13 on lease contracts in 1976 and IASB issued IAS 17 in 1980, which was amended in 1997 and IFRS 16, issued in January 2016, which will be effective on January 1, 2019 , to solve
... Show More