Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the energy required by the drone to use the technology. A finite number of states have been designed to include a larger range of wireless network techniques, enabling the drones to be recognized while they are further away and in remote areas. This is achieved by including other means of RF channels, such as 4G/5G, Automatic Dependent Surveillance-Broadcast (ADS-B), long range Internet of things (IoT), and satellite communications, in the suggested ER-ID algorithm of this study. The introduced algorithm is tested via a case study. The results showed the ability to detect drones using all types of available radio frequency communication systems (RF-CS) while also minimizing the consumed energy. Hence, the authorities can control the licensed drones by using available RF-CS devices, such as Bluetooth and Wi-Fi, which are already widely used for mobile phones, as an example.
Ticks (Acari: Ixodidae) are ectoparasites that infest livestock in every geographic region of the world and are vectors of several viral, bacterial, and protozoan pathogens to both animals and humans. There is little information is available is about tick presence in Buffalo Bubalus bubalis (Linnaeus, 1758) (Artiodactyla, Bovidae) in Iraq. The current study determined the species of ticks parasitizing Buffalo in some central and southern regions included: Baghdad (Al Fathelia), Karbala (Al-Hussainia), Wasit (Kut and Al-Suwairah), Al-Qadisia (Al- Diwaniyah, Al- Saniya, Al-Mihnawea, and Afak), Thi Qar (Al-Nasiriyah and Al-chibayish), Missan (Amara and Qalaat Salih) and Basrah (Al-Haretha, Al-Madena and Al-Deer). A total of 150 Buffal
... Show MoreThe present paper talks about balance between two poems which are the Nouniya for Ibn Zaidoun and Andalusia for Ahmed Shawqi. This study is not claimed to be the first of its kind but we found some artistic aspects that deserve to stop at them. This what makes the two the focus of critics and scholars as well in addition to their emphasis on the unity of the human feelings and immortality through the poet's ability to employ those feelings and emotions in a way that it can express the human soul in every time and place. That is what we believe Ibn Zaidoun had reached in his poem. Therefore, the present paper has come into the conclusion that Ibn Zaydoon's Nouniya is better than Shawqi's Andalusia due to what we got through reading and an
... Show MoreOne of ciphering systems depends on transposition of letters in plain text to generate cipher text. The programming of transposition depends mainly on 2-dimension matrix in either methods but the difference is in columnar .We print columns in the matrix according to their numbers in key but in the fixed, the cipher text will be obtained by printing matrix by rows.
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThe research aims to develop alternatives to transportation at the entrance to the Educational City (University of Baghdad) during the morning and evening peaks, which result from of the traffic congestion at the entrances to the educational city (the University of Baghdad), and affects the emotional, functional, and social performance of the whole city, and leads to hotbeds of confluence and congestion at the entrances in the morning and evening peaks. This movement was measured on the ground for pedestrians and vehicles. Some criteria were adopted to determine the density of road length to the area and density of roads for the number of users and the rate of the area served by roads. The research reviews the experiences of some
... Show MoreThe research discusses the public relations services, registration, and academic advising at Petra University for the years 2013-2014. Using a field study and surveying Petra University students to be informed about the services and to cover the tiny details that have to do with public relations role in the university as a specialized department interested in serving public and gaining their trust in terms of what is legal and possible to build and enhance the university reputation. And gain mutual trust between the university and its publics.
The public relations is consi
Through the early childhood and after the ablactating the child learns acquired food habbits that might studying with him throughout his life. Here the parents role arises: teaching the child the sound food habits and hygienic styles and whatever beneficial to the health and with the sufficient quantities for the body. In this way the experiences the child learns at home will be of great help in his future life in choosing the suitable food after becoming more dependent in making his decisions and choices away from his parents. The results in this study showed that the averages of the children’s consumption of the high energy foods in comparison with the other highest consumption average , after that comes the con sumption of soft drills
... Show MoreThe field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show MoreSmart cities have recently undergone a fundamental evolution that has greatly increased their potentials. In reality, recent advances in the Internet of Things (IoT) have created new opportunities by solving a number of critical issues that are allowing innovations for smart cities as well as the creation and computerization of cutting-edge services and applications for the many city partners. In order to further the development of smart cities toward compelling sharing and connection, this study will explore the information innovation in smart cities in light of the Internet of Things (IoT) and cloud computing (CC). IoT data is first collected in the context of smart cities. The data that is gathered is uniform. The Internet of Things,
... Show More