In networking communication systems like vehicular ad hoc networks, the high vehicular mobility leads to rapid shifts in vehicle densities, incoherence in inter-vehicle communications, and challenges for routing algorithms. It is necessary that the routing algorithm avoids transmitting the pockets via segments where the network density is low and the scale of network disconnections is high as this could lead to packet loss, interruptions and increased communication overhead in route recovery. Hence, attention needs to be paid to both segment status and traffic. The aim of this paper is to present an intersection-based segment aware algorithm for geographic routing in vehicular ad hoc networks. This algorithm makes available the best route f
... Show MoreThe extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.
A total of 165 clinical sample included Urine, Swab wounds and Burns were collected from Baghdad Governorate. Results showed that rate all isolates of E. coli was 50(30.3%) and rate of urine infection was 46(92%) and rate of swab wounds infection 4(8%). Where was diagnostic based on streaked on MacConkey agar, then single colony was transferred to Eosin Methylene Blue (EMB). Identification some of the biochemical test included: Catalase test, Oxidase test, Indole test, Methyl red, Vogues - Proskauer test and Citrate Utilization test. Then confirmed by the Vitek - 2 Compact System. The ability of E.coli isolate to biofilm formation to be studied it is considered one of the most important factors of virulence and has role in causing injury an
... Show MoreThe second half of the last century witnessed a great scientific revolution that was able to bring about wide changes in various fields, including the field of physical education, which plays a fundamental role in the process of change for the better, and which knocked all the doors of modern science in various aspects and from this perspective we see that students have different capabilities And interests and motives, which require providing a differentiated education, and this depends on the necessity of knowing each student and on the school’s ability to know appropriate strategies for teaching each student so there is no single way to teach so the research problem comes in experimenting with an educational method that works on
... Show MoreMy research deals with the positions that the Prophet (PBUH) distressed. And condolences to those who lost her father and other problems and calamities that impede the life of women, has been given to the Lord of men, and good qualities, to strike the nation's finest proverbs in ensuring lost and lost of women and children, to be shown to us humanity in its finest form, and the best analyzed, and I hope God help And guidance and Rashad
The study aims to design an electronic puppet educational theater by Camtasia studio and identify the effectiveness in learning some of the artistic gymnastics skills for first grade, the research curriculum is experimental by designing two equal groups, and the research sample first grade students are distributed among 4 grade, and by the pumpkin determines two divisions (15 from each) representing the experimental group and control group, the main experiment conducted for 8 weeks by two educational units per week after which the post-tests were conducted, SPSS was used to process the results, and it was found that the electronic puppet educational theater contributed by making the learning process enjoyable and interesting and meeting the
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreAbstract:
The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.
A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of
... Show More