There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show MoreThe work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other
... Show MoreThe mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore, the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of the mobile network and its wide usage through different types of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat
... Show MoreIn this research, the concentration of radon gas has been calculated in the classrooms of schools in Diyala Governorate by using the nuclear track detector (CR-39), which was one of the organic solid-state nuclear detectors (SSNTDs). After calculating the radon gas concentration, the lung cancer cases were calculated. The results showed that the lowest value was found in (Alshumue) school (4.753) people. In contrast, the highest value was found in (Habhib) school (20.421). The average values of lung cancer cases in Diyala governorate were equal to (9.319) per person. The results showed that the number of lung cancer cases per year per million persons in Diyala Governorate schools was below the allowed limit from (ICRP) agency (170-230) p
... Show MoreWireless control networks (WCNs), based on distributed control systems of wireless sensor and actuator networks, integrate four technologies: control, computer network and wireless communications. Electrostatic precipitator (ESP) in cement plants reduces the emissions from rotary kiln by 99.8% approximately. It is an important thing to change the existing systems (wireline) to wireless because of dusty and hazardous environments. In this paper, we designed a wireless control system for ESP using Truetime 2 beta 6 simulator, depending on the mathematical model that have been built using identification toolbox of Matlab v7.1.1. We also study the effect ofusing wireless network on performance and stability of the closed l
... Show MoreSpices are natural substances taken from special plants and have a different taste when added to food and some of them have great benefits for health and body. These plants vary from country to country depending on the type of soil and how they are grown and this affects their quality. In this study, the specific activity of 40K, 238U and 232Th series and 137Cs in some selected natural food spices commonly used in Iraq kitchen were determined using gamma spectrometry and the ingested doses via food consumption were also assessed. The average specific activity of 40K, 238<
Let A ⊆ V(H) of any graph H, every node w of H be labeled using a set of numbers; , where d(w,v) denotes the distance between node w and the node v in H, known as its open A-distance pattern. A graph H is known as the open distance-pattern uniform (odpu)-graph, if there is a nonempty subset A ⊆V(H) together with is the same for all . Here is known as the open distance pattern uniform (odpu-) labeling of the graph H and A is known as an odpu-set of H. The minimum cardinality of vertices in any odpu-set of H, if it exists, will be known as the odpu-number of the graph H. This article gives a characterization of maximal outerplanar-odpu graphs. Also, it establishes that the possible odpu-number of an odpu-maximal outerplanar graph i
... Show MoreTwo modes of electrochemical harvesting for microalgae were investigated in the current work. A sacrificial anode (aluminum) was used to study the electrocoagulation-flotation process, and a nonsacrificial anode (graphite) was used to investigate the electroflotation process. The study inspected the effect of chloride ions concentration and the interelectrode distance on the performance of the electrochemical harvesting processes. The results demonstrated that both electrodes achieved maximum harvesting efficiency with a 2 g/L NaCl concentration. Interestingly, by increasing the NaCl concentration to 5 g/L, the harvesting efficiency reduced dramatically to its lowest value. Generally, the energy consumption decreased with increasing
... Show MoreObjective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show More