Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-hop basis based on the maximum distance toward the destination from the sender and sufficient communication lifetime, which guarantee the completion of the data transmission process. Moreover, communication overhead is minimized by finding the next hop and forwarding the packet directly to it without the need to discover the whole route first. A comparison is performed between MDORA and ad hoc on-demand distance vector (AODV) protocol in terms of throughput, packet delivery ratio, delay, and communication overhead. The outcome of the proposed algorithm is better than that of AODV.
The present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
The mediation system is based on settling the dispute amicably through the intervention of a third party by bringing views closer away from the judiciary, which is an amicable way to settle disputes, which disputants resort to voluntarily, but some Western legislation has begun to impose resorting to mediation to settle disputes compulsorily, to take advantage of its advantages, get rid of the disadvantages of resorting to the judiciary in some disputes, and relieve pressure on the courts.
A political perusal of Initiations in Declaring Middle East a District vacant of mass Destruction weapons
This research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu
... Show MoreThis study aims to impact statement played by banking governance according to the decisions of the Basel Committee in achieving the strategic objectives of the banks, But order to achieve the this goal has been the adoption of two hypotheses in addition to the two main hypotheses as sub answered preliminary The study seeks to verify their health and two (no correlation relationship and impact between Banking governance and achieve strategic objectives), has been tested hypotheses. Study has reached
... Show MoreTraffic loading and environmental factors are among the most serious variables that cause the spoilage of flexible pavements and lead to a decrease in their design life. The objective of this study is to investigate the influence of axle load raise and the change in resilient modulus on the flexible pavement design life. Locally, Highway geometric design code for Iraqi building code has assign certain admissible maximum load limits per every axle truck type that should not be overrun. In this paper nine different axle truck loads (8, 9, 10, 11, 12, 13, 14, 15, and 16) tons, single axle with dual tire and, and two different resilient moduli of asphalt pavement were chosen. The evaluation was carried out assuming high temperature to represent
... Show MoreBreast cancer is the commonest cause of cancer related death in women worldwide. Amplification or over-expression of the ERBB2 (HER/neu) gene occurs in approximately 15-30% of breast cancer cases and it is strongly associated with an increased disease recurrence and a poor prognosis. Determination of HER2/neu status is crucial in the treatment plan as that positive cases will respond to trastuzumab therapy. It has been used to test for HER2/neu by immunohistochemistry as a first step and then to study only the equivocal positive cases (score 2+) by in situ hybridization technique. The aim of our study is to compare between immunohistochemistry and silver in situ hybridization (SISH) in assessment of human epidermal growth factor (HER2/neu)
... Show MoreBackground: Restoration of root canal treated teeth with a permanent restoration affect in the success of endodontically treated teeth. This in vitro study was performed to evaluate and compare the fracture strength of endodontically treated teeth restored by using custom made zirconium posts and cores, prefabricated carbon fiber, glass fiber and zirconium ceramic posts. Materials and method: Forty intact human mandibular second premolars were collected for this study and were divided into five groups. Each group contains 8 specimens: Group1: Teeth restored with Carbon Fiber Posts; Group2: Teeth restored with Glass Fiber Posts; Group3: Teeth restored with Zirconium Ceramic prefabricated Posts; Group4: Teeth restored with Zirconium Posts
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More