Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-hop basis based on the maximum distance toward the destination from the sender and sufficient communication lifetime, which guarantee the completion of the data transmission process. Moreover, communication overhead is minimized by finding the next hop and forwarding the packet directly to it without the need to discover the whole route first. A comparison is performed between MDORA and ad hoc on-demand distance vector (AODV) protocol in terms of throughput, packet delivery ratio, delay, and communication overhead. The outcome of the proposed algorithm is better than that of AODV.
In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa
... Show MoreAs an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based
... Show MoreFourty -tow Libyan patients with hydatidosis, which were
referred to by the physician for the detection of hydatid cyst by X - rays, Ultrasound and CT-Scan. The infection rate in females and males was(69% )and (31% )respectively .The highest rate 69% was in the liver, followed by the lung( 23.8%), the brain (4.8%) and kidney
(2.4%).
A total of 42 serum samples were gathered from Libyan patients infected with hydatidosis, 33 serum samples from patients cases with other parasitic diseases than hydatidosis and 30 serum samples from healthy normal controls and were tested by Dot-ELIZA utilizing antigen B from sheep hy
... Show MoreIn this research project, a tip-tilting angle of a photovoltaic solar cell was developed to increase generated electrical power output. An active, accurate, and simple dual-axis tracking system was designed by using an Arduino Uno microprocessor. The system consisted of two sections: software and apparatus (hardware). It was modified by using a group of light-dependent resistor sensors, and two DC servo motors were utilized to rotate the solar panel to a location with maximum sunlight. These components were arranged in a mechanical configuration with the gearbox. The three locations of the solar cell were chosen according to the tilt angle values, at zero angles, which included an optimal 33-degree angle for the Baghdad location and
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreRecently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical.
... Show MoreThe paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms
... Show MoreAbsence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa
Background: The main aim of the present study is to qualify and quantify voids formation of root canals obturated with GuttaCore (GC) and experimental Hydroxyapatite polyethylene (HA/PE) as new carrier-based root canal fillings by using micro computed tomography scan. Materials and methods: In the present study, eight straight single-rooted human permanent premolar teeth are selected and disinfected, then stored in distilled water. The teeth decoronated leaving a root length of 12mm each. The root canals instrumented by using crown down technique and the apical diameter of the root canal prepared to a size # 30/0.04 for achieving standardized measurements. A 5mL of 17% EDTA used to remove the smear layer followed by 5mL of 2.5% NaOCl and r
... Show More