Recent growth in transport and wireless communication technologies has aided the evolution of Intelligent Transportation Systems (ITS). The ITS is based on different types of transportation modes like road, rail, ocean and aviation. Vehicular ad hoc network (VANET) is a technology that considers moving vehicles as nodes in a network to create a wireless communication network. VANET has emerged as a resourceful approach to enhance the road safety. Road safety has become a critical issue in recent years. Emergency incidents such as accidents, heavy traffic and road damages are the main causes of the inefficiency of the traffic flow. These occurrences do not only create the congestion on the road but also increase the fuel consumption and pollute the environment. Emergency messages notify the drivers about road accidents and congestions, and how to avoid the dangerous zones. This paper classifies the emergency messages schemes into three categories based on relay node, clustering and infrastructure. The capabilities and limitations of the emergency messages schemes are investigated in terms of dissemination process, message forward techniques, road awareness and performance metrics. Moreover, it highlights VANET-based challenges and open research problems to provide the solutions for a safer, more efficient and sustainable future ITS.
In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreOur study comes up to clarify the role of television in spreading the culture of violence with a child. This study represents one of the important studies that have tried to highlight the impact of these programmes, particularly cartoons, on the child's behaviors, actions and acquired habits.Violence considers a common phenomenon among the people, as the role of the media, particularly TV has a vital role due to its properties, characteristics and its significant impact on different segments and groups in society and in children particularly through exposure to programmes of films.The results of the study have been affected by the rising proportion of females to males, and that the contribution of real life has a big role in the child ac
... Show MoreAbstract:
Since the railway transport sector is very important in many countries of the world, we have tried through this research to study the production function of this sector and to indicate the level of productivity under which it operates.
It was found through the estimation and analysis of the production function Kub - Duglas that the railway transport sector in Iraq suffers from a decline in the level of productivity, which was reflected in the deterioration of the level of services provided for the transport of passengers and goods. This led to the loss of the sector of importance in supporting the national economy and the reluctance of most passengers an
... Show MoreThe Quality function deployment (QFD) tool is an important tool of total quality management because its a link between two important parts customer and production process of the product, using advanced House of quality, which contributed to provide more details about improving the product before it had a vision for the future of the product be improved. Also the identification of the two competitors (Alwazeer , Altouri) bases on the survey of retailers which they identified five competitors products (Alwazeer , Altouri , Ferry , Jif , Dina)for the product (Zahi). Then House of quality to product (Zahi) has been developed By using a Kano Model to classify of customer's requirements for the
... Show MoreThe research aims to improve operational performance through the application of the Holonic Manufacturing System (HMS) in the rubber products factory in Najaf. The problem was diagnosed with the weakness of the manufacturing system in the factory to meet customers' demands on time within the available resources of machines and workers, which led to time delays of Processing and delivery, increased costs, and reduced flexibility in the factory, A case study methodology used to identify the reality of the manufacturing system and the actual operational performance in the factory. The simulation was used to represent the proposed (HMS) by using (Excel 2010) based on the actual data and calculate the operational performance measures
... Show MoreStylistics represents a modern approach in understanding the literary text through the linguistic patterns that form it. The distinctive phenomena that the text includes constitute special features in it. As well as exploring its aesthetic aspects through description and analysis at the same time. The close link between stylistics and linguistics made stylistics occupy a prominent place in modern literary criticism.
In this regard, we do not want to dwell on the different directions of stylistics. Rather, we will prolong the discussion in the study of the style as a (deviation. Aversion) from the original. Because this trend plays on the chord of the paradox between the surface structure and the deep structure, especially when the sur
Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
Background: The beliefs of pharmacy students in their curriculum may be critical to the success of medical education and the development of global health competences. Objective: To assess the beliefs, attitudes, and obstacles of PharmD students at the College of Pharmacy, University of Baghdad, during their first year in the newly adopted PharmD program. Method: In-depth qualitative interviews were conducted using flexible probing approaches. A sample of fourth-year PharmD students from the University of Baghdad's College of Pharmacy was selected using a purposive sampling method. The gathered data was analyzed using a thematic content analysis approach. Results: 40% of participants applied for the program because they believed it w
... Show MoreSoftware Defined Networking (SDN) with centralized control provides a global view and achieves efficient network resources management. However, using centralized controllers has several limitations related to scalability and performance, especially with the exponential growth of 5G communication. This paper proposes a novel traffic scheduling algorithm to avoid congestion in the control plane. The Packet-In messages received from different 5G devices are classified into two classes: critical and non-critical 5G communication by adopting Dual-Spike Neural Networks (DSNN) classifier and implementing it on a Virtualized Network Function (VNF). Dual spikes identify each class to increase the reliability of the classification
... Show More