A fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. Th
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreFuture generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are descr
... Show MoreThis research aimed at studying the role of calculated knowledge an its efficiency in improving the performance especially most of the organizations are living within knowledge era which concentrate on new technology investment in different fields of modern live . Under the scientific trends towards the economy of calculated knowledge which depend basically on new computer program in order to utilize the knowledge to raise the level of work performance exploiting different resources in the best way that helps the organizations to achieve their objectives because the information technology and computer programs became a means of survival and indispensible instrument within the developed world which depend on prosperity . progress
... Show MoreMobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More
The teacher is the most able to achieve the goals of education in education because he has the ability to affect the behavior of the disciples testified and its actions and appearance and other actions that convey pupils with it sometimes in a manner unconscious or unconscious , and the importance of the role of the teacher in the educational process , it is necessary to compromise the care and attention to the extent that commensurate with the important role that the rise in the preparation of youth and composition , and as a result is needed to continue efforts to improve the quality of teacher preparation so that it can be more effective and positive in the educational process .
First - Research Goals -<
A new two-way nesting technique is presented for a multiple nested-grid ocean modelling system. The new technique uses explicit center finite difference and leapfrog schemes to exchange information between the different subcomponents of the nested-grid system. The performance of the different nesting techniques is compared, using two independent nested-grid modelling systems. In this paper, a new nesting algorithm is described and some preliminary results are demonstrated. The validity of the nesting method is shown in some problems for the depth averaged of 2D linear shallow water equation.
Abstract:
This research emerged due to the needs of Iraqi social sector for diagnosing the problems ,finding the appropriate solutions,and exploiting the social opportunities to solve these problems .The research problem focused on raising the following question: "Were Iraqi Managers in the Ministry of Labor and Social Affairs able to use their qualifications as social entrepreneurs in the ministry to improve the quality of life of the disadvantaged groups?", In light of that, the importance and objectives of the study were determined, and this research derives its importance from trying to address social problems by measuring the degree of meeting the subjective and objective needs of the custo