Nowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a communication between devices, it is resorted to creating an ad hoc network using Device-to-Device technology. Wi-Fi Direct technology offers a suitable platform for creating an ad hoc network, as it supports the speed and range of standard Wi-Fi. In this paper, a mechanism is proposed to build an infrastructure-less ad hoc network, through developing the Wi-Fi direct protocol for Android smartphones. This network provides users ability to have a reliable communication, using the reliable Transmission Control Protocol only, and can continuously expand. Therefore it would be very beneficial in the absence of other infrastructure communication media such as cellular or Wi-Fi internet access.
Background: Multiple sclerosis is a chronic heterogeneous demyelinating axonal and inflammatory disease involving the Central Nervous System [CNS] white matter with a possibility of gray matter involvement in which the insulating covers of nerve cells in the brain and spinal cord are damaged. This damage disrupts the ability of parts of the nervous system to communicate, resulting in a wide range of signs and symptoms. Cerebral venous insufficiency theory was raised as a possible etiology for the disease at 2008 by Zamboni an Italian cardiothoracic surgeon. This theory was defeated by Multiple Sclerosis[ MS] researchers and scientists who thought that the disease is an autoimmune rather than vascular.
Obj
... Show MoreSeveral new derivatives of 1, 2, 4-triazoles linked to phthalimide moiety were synthesized through following multisteps. The first step involved preparation of 2, 2-diphthalimidyl ethanoic acid [2] via reaction of two moles of phthalimide with dichloroacetic acid. Treatment of the resulted imide with ethanol in the second step afforded 2, 2-diphthalimidyl ester [3] which inturn was introduced in reaction with hydrazine hydrate in the third step, producing the corresponding hydrazide derivative [4]. The synthesized hydazide was introduced in different synthetic paths including treatment with carbon disulfide in alkaline solution then with hydrazine hydrate to afford the new 1, 2, 4-triazole [10]. Reaction of compound [10] with different alde
... Show MoreBackground: cerebellar astrocytroma is the commonest paediatric posterior fossa tumor.
Patients and method: 54 patients taken from the neuro-surgical unit in the specialized surgical hospital from Aug 1995 till March 2003, all patients studied thoroughly age, gender, Presentation, Radiological diagnoses, surgery, additive therapy & final outcome including 5 years survival &
conclusion is reached.
Results and discussion: the results show that more than half of the patients were at age 5-7 years with very slight male predominance, most cases diagnosed by CT, some with MRI or MRI
alone.Surgery was done for all cases & 16 patients' preceeded by VP shunt. The final out come is compared with other si
For a finite group G, the intersection graph of G is the graph whose vertex set is the set of all proper non-trivial subgroups of G, where two distinct vertices are adjacent if their intersection is a non-trivial subgroup of G. In this article, we investigate the detour index, eccentric connectivity, and total eccentricity polynomials of the intersection graph of subgroups of the dihedral group for distinct primes . We also find the mean distance of the graph .
In this paper, we have extracted Silica from rice husk ash (RHA) by sodium hydroxide to produce sodium silicate. 3-(chloropropyl)triethoxysilane (CPTES) functionalized with sodium silicate via a sol-gel method in one pot synthesis to prepare RHACCl. Chloro group in compound RHACCl replacement in iodo group to prepere RHACI. The FT-IR clearly showed absorption band of C-I at 580 cm-1. Functionalized silica RHACI has high surface area (410 m2/g) and average pore diameter (3.8 nm) within mesoporous range. X-ray diffraction pattern showed that functionalized silica RHACI has amorphous phase .Thermogravemitric analysis (TGA) showed two decomposition stages and SEM morphology of RHACI showed that the particles have irregu
... Show MoreBackground : Hyperglycosylated hCG a newly discovered variant of hCG which can be used as a predictor of invasion of trophoblastic cells in patient with gestational trophoblastic disease. Objectives : To measure hyperglycosylated human chorionic gonadotrophin and to assess how far it can be used as predictor of invasion in invasive mole and choriocarcinoma. Study design control study. Setting: : Case Gynecological department in Baghdad Teaching Hospital from January 2016 to January 2017. Patient and Methods : 60 women were enrolled in this study 30 of them were with gestational trophoblastic disease (no.= 30 ) the remainder were normal pregnancy (no. =30) , hCG –H level was measured in both groups. Results : Mean serum hCG-H le
... Show MoreThis paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.
In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreFar infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in
... Show MorePassive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay
... Show More