Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and pollute the environment. Emergency messages notify the drivers about road accidents and congestions, and how to avoid the dangerous zones. This paper classifies the emergency messages schemes into three categories based on relay node, clustering and infrastructure. The capabilities and limitations of the emergency messages schemes are investigated in terms of dissemination process, message forward techniques, road awareness and performance metrics. Moreover, it highlights VANET-based challenges and open research problems to provide the solutions for a safer, more efficient and sustainable future ITS.
The Iraqi culture faced a set of challenges that can be diagnosed with the most prominent features as follows:
- The dominance of authoritarian political systems which entails authoritarian regimes with the absence of contemporary political concepts of human rights.
- The prevalence of non- informed cultural systems which have the shortage of capabilities that enable them to activate cultural elements in positive references, historical, or seclusion on itself and not be able to interact with the current active cultures.
- Stagnant economic conditions have not had a decent life for individuals, or a certain level of well-being, as well as poor services and others.
- Social life controlled by the prevai
The research was titled: Approval of the Imam of the Nuclear of Iraqis through the curriculum of the students.
The research revolves around the study of the weight of the imam nuclear jurisprudence in which the views of the Iraqi jurists of the Imam Shafi'i agreed through the book of students' approach to the nuclear imam, the research included a brief translation of the nuclear imam, and the definition of his place in the Shafi'i school, and then the definition of Iraqi jurists and then study the jurisprudence The course of research is only three issues, and compared with the views of imams, and the statement of the most correct opinion, and God and the conciliator.
researcher
The purpose of this paper is to apply different transportation models in their minimum and maximum values by finding starting basic feasible solution and finding the optimal solution. The requirements of transportation models were presented with one of their applications in the case of minimizing the objective function, which was conducted by the researcher as real data, which took place one month in 2015, in one of the poultry farms for the production of eggs
... Show MoreThe research deals with a modern concept in its applications and the studies it deals with, as the concept of urban densification is one of the most recent sustainable development strategies for cities.
Studies looking at the relationship between condensation and viability show mixed results. This study sheds light on how the built environment of dense urban areas affects the perceived quality of life of the population. How to enhance acceptance of dense life is an important question to investigate.
Adopting the concept of urban densification in city planning policies to be more sustainable and livable is of great importance by achieving efficient use of urban land and limiting urban sprawl, as well as reducing the
... Show MoreCredit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them. This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c
... Show MoreAs a result of the emergence of new business paradigms and the development of the digital economy, the interaction between operations, services, things, and software across numerous fields and communities may now be processed through value chain networks. Despite the integration of all data networks, computing models, and distributed software that provides a broader cloud computing solution, the security solution is missing or inadequate, and more work is required to strengthen security requirements such as mutual entity trustworthiness, access controls, identity management, and data protection, all aspects of detecting and preventing attacks or threats. In order to combat cybersecurity threats, various international organizatio
... Show MoreLow oil extraction and early high water production are caused in part by reservoir heterogeneity. Huge quantities of water production are prevalent issues that happen in older reservoirs. Polyacrylamide polymer gel systems have been frequently employed as plugging agents in heterogeneous reservoirs to regulate water output and increase sweep efficiency. Polyacrylamide polymer gel systems are classified into three classes depending on their composition and application conditions, which are in-situ monomer gel, in-situ polymer gel, and preformed particle gel (PPG).
This paper gives a comprehensive review of PPG’s status, preparation, and mechanisms. Many sorts of PPGs are categorized, for example, millimeter-sized preformed p
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More