The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstraction and examination of the topological structure by choosing a few factors associated with the connection of the roads. These involved the cyclomatic number, Eta coefficient, Aggregate Transform Score (ATS), Beta, gamma, and Alpha indices. According to the findings, the Al-Adhamiya roads network is more developed, better linked, and has a higher overall connectivity value than the Al-Kadhimiya network. The two study areas, however, have minimal circuitry and high complexity. Due to the modifications and expansion of land use that the municipalities have seen, the research suggests that the transportation network should be developed to reach greater interconnectedness, particularly in locations outside the city center.
In this paper we introduce the idea of the commutator of two fuzzy subsets of a group and study the concept of the commutator of two fuzzy subsets of a group .We introduce and study some of its properties .
The current study was conducted to test the efficiency of the vegetative part (plant leaves) of plant species of shrubs and trees involved in forming semi-artificial vegetation in the city of Baghdad, Karkh, in the uptake and accumulating the lead element that pollutes the air in the city atmosphere. Five plant sampling sites were selected: Al-Kadhimiyah, Al-Mansour, Al-Ma'aml (Al-Salam district), Al-Adl, and Al-Ameriya district intersections (Al-Seklat), and symbols were given (A, B, C, D, E) respectively. The spread and distribution of plants vary in terms of human activities and pollution levels, affecting the five sites that recorded more than 20 species. For a real comparison between plant efficiency and the effect of the nature of
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreWireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More