There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be satisfied in order to transfer opening call within new cell, finally we submitted again a threshold distance to exceed by a mobile station in order handoff process is done. The purpose of all these thresholds is to decrease the unnecessary handoffs that can be happened and causing either handoff delayed or call dropped. Our simulation results illustrated that the new proposed scheme is sufficiently improved the handoff process with reducing the unnecessary handoffs as compared with other schemes.
This study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show MoreThe problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of М
... Show MoreWireless communications are characterized by their fastest growth in history, as they used ever-evolving and renewed technologies, which have allowed them to spread widely. Every day, communication technology introduces a new invention with features that differ from its predecessor. Bell Laboratories first suggested mobile wireless communication services to the general population in the late 1940s. Still, it wasn't easy at that time to use on a large scale due to its high costs. This paper aims to describe the state of cellular mobile networks; by comparing the sources of electromagnetic pollution caused by these networks, measure the level of power density in some residential areas, and compare them with international standards adopted in
... Show MoreThe paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms
... Show MoreBackground: Proper cleaning and shaping of the whole root canal space have been recognized as a real challenge, particularly in oval-shaped canals.This in vitro study was conducted to evaluate and compare the efficiency of different instrumentation systems in removing of dentin debris at three thirds of oval-shaped root canals and to compare the percentage of remaining dentin debris among the three thirds for each instrumentation system. Materials and methods: Fifty freshly extracted human mandibular molars with single straight oval-shaped distal root canals were randomly divided into five groups of ten teeth each. Group One: instrumentation with ProTaper Universal hand instruments, Group Two: instrumentation with ProTaper Universal rotary
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreThis study aimed to identidy the role of a professional social worker practice specialist in the field of social care for Corona patients, in light of some demographic variables such as (gender, marital status, economic status,), through a field study at the Iraqi Ministry of Social Affairs. A random sample of (50) social workers in the Iraqi Ministry of Social Affairs in various places affiliated with the ministry was chosen. a questionnaire developed by the researcher about the role of the social worker in the field of social care for Corona patients was administered to the study sample to collect the needed data. The results showed that there is a positive statistically significant correlation relationship at the level (0.01) between
... Show More