Nowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a communication between devices, it is resorted to creating an ad hoc network using Device-to-Device technology. Wi-Fi Direct technology offers a suitable platform for creating an ad hoc network, as it supports the speed and range of standard Wi-Fi. In this paper, a mechanism is proposed to build an infrastructure-less ad hoc network, through developing the Wi-Fi direct protocol for Android smartphones. This network provides users ability to have a reliable communication, using the reliable Transmission Control Protocol only, and can continuously expand. Therefore it would be very beneficial in the absence of other infrastructure communication media such as cellular or Wi-Fi internet access.
Background: Beta thalassemia major is an inherited disorder that may affect general and oral health.The purpose of this study was toassess the severity of dental caries in relation to oral cleanliness, mutans streptococciamong a group of boys with beta thalassemia majorin comparison with a control group. Materials and Methods: The study involved 30 boys with BTM aged 10-12 years compared to 30 healthy boys with the same age group. d1-4mfs and D1-4 MFS indices were applied (Muhlemann, 1976), the viable counts of mutans streptococci in stimulated saliva were also determined. Results: The entire thalassemic group was caries-active. For both dentitions, a higher dmfs/DMFS values were recorded for study compared to control group, difference was
... Show MoreIn this paper we introduce the notions of t-stable extending and strongly t-stable extending modules. We investigate properties and characterizations of each of these concepts. It is shown that a direct sum of t-stable extending modules is t-stable extending while with certain conditions a direct sum of strongly t-stable extending is strongly t-stable extending. Also, it is proved that under certain condition, a stable submodule of t-stable extending (strongly t-stable extending) inherits the property.
In this research is estimated the function of reliability dynamic of multi state systems and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of
Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processe
... Show MoreAmong many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show MoreTigris River is the lifeline that supplies a great part of Iraq with water from north to south. Throughout its entire length, the river is battered by various types of pollutants such as wastewater effluents from municipal, industrial, agricultural activities, and others. Hence, the water quality assessment of the Tigris River is crucial in ensuring that appropriate and adequate measures are taken to save the river from as much pollution as possible. In this study, six water treatment plants (WTPs) situated on the two-banks of the Tigris within Baghdad City were Al Karkh; Sharq Dijla; Al Wathba; Al Karama; Al Doura, and Al Wahda from northern Baghdad to its south, that selected to determine the removal efficiency of turbidity and
... Show MoreWireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I
... Show MoreThe cervical cancer considered as the fourth female prevalent disease worldwide, it was once the most extensively recognized female cancer two in many low-income countries. Human Cytomegalovirus (HCMV) exhibits broader tropism and can cause infection in most of the human body organs. Although, human cytomegalovirus HCMV is not yet considered an oncogenic virus, there is increased evidences of HCMV infection implication in malignant diseases of different cancer types. The present study aims to evaluate the effect of CMV infection on the development of HPV16 positive cervical cancinoma. The current retrospective study enrolled a number of paraffinized cervical cancer tissues .included 30 cervical carcinomatous tissues and 10 biopsies from an
... Show MoreZiegler and Nichols proposed the well-known Ziegler-Nichols method to tune the coefficients of PID controller. This tuning method is simple and gives fixed values for the coefficients which make PID controller have weak adaptabilities for the model parameters variation and changing in operating conditions. In order to achieve adaptive controller, the Neural Network (NN) self-tuning PID control is proposed in this paper which combines conventional PID controller and Neural Network learning capabilities. The proportional, integral and derivative (KP, KI, KD) gains are self tuned on-line by the NN output which is obtained due to the error value on the desired output of the system under control. The conventio
... Show More