Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conducted to determine the influence of flying altitude. The results indicate that hybrid routing protocols outperform other types of protocols in terms of average throughput. Proactive protocols, on the other hand, have the least jitter.
BACKGROUND : Bifurcational coronary lesions are
frequent and amounts to almost one fifth of routine
practice concerning up to 15 – 20 % of cases .
Revascularization by percutaneous coronary
intervention ( PCI ), of bifurcational lesion has
become easier by stenting yet it remains a frequent
challenge.
OBJECTIVE : To evaluate the success and hospital
complications of two most frequent technique of stent
deployment in bifurcational PCI.
METHODS : We prospectively analysed the data of
140 consecutive patients with bifurcational PCI at
Ibn_Al-Bitar Hospital for cardiac surgery for the
period from July 2008 to July 2009 .
Depending on whether the side branch was stented or
not, the patient has fa
Language is an instrument, a tool of culture and a way of communication between the past and the present. No one can know the treasure of human thought and experience in the fields of history, poetry and prose without language as an instrument of communication between cultures and peoples. Language under this description faces many problems, the most important of which is linguistic globalization, which means the flow rate of the strongest language, which has elements of power, domination and control over other languages. In this article, we consider linguistic globalization as a serious problem faced by every language, and we consider its main shortcomings and advantages and its impact on the language and ways of protecting the Arabic lang
... Show MoreShallow foundations have been commonly used to transfer load to soil layer within the permissible limits of settlement based on the bearing capacity of the soil. For most practical cases, the shape of the shallow foundation is of slight significance. Also, friction resistance forces in the first layers of soils are negligible due to non-sufficient surrounding surface area and compaction conditions. However, the bearing capacity of a shallow foundation can be increased by several techniques. Geocell is one of the geosynthetic tool applied mainly to reinforce soil. This study presents a numerical approach of honeycombed geocell steel panels reinforcing the sandy soil under shallow foundation, and several parameters are investigated such as th
... Show MoreThe aim of this paper is to introduce the notion of hyper fuzzy AT-ideals on hyper AT-algebra. Also, hyper fuzzy AT-subalgebras and fuzzy hyper AT-ideal of hyper AT-algebras are studied. We study on the fuzzy theory of hyper AT-subalgebras and hyper AT-ideal of hyper AT-algebras. Furthermore, the fuzzy set theory of the (weak, strong, s-weak) hyper fuzzy ATideals in hyper AT-algebras are applied and the relations among them are obtained.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreIn this paper, we give the concept of N-open set in bitopological spaces, where N is the first letter of the name of one of the authors, then we used this concept to define a new kind of compactness, namely N-compactness and we define the N-continuous function in bitopological spaces. We study some properties of N-compact spaces, and the relationships between this kind and two other known kinds which are S-compactness and pair-wise compactness.
It is important to set the background of stiffen arbitration agreement, to understand the real reasons of the fighting. When the Syrians began to lose, raised the masahif and made their announcement, most the qurrar, and so no need to continued fighting.
In their view all that remained was the matter of drawing up formal peace with Ali, Muamiya; Ali would recognize as Amir al-muminin by both Syrian and Iraqis.
The most of the Iraqisfavored settlement for different persons, for example-A'shath, the most power full of the clan leaders of Rabia, his interest by insuring that neither Ali nor Mu
... Show MoreThis paper deals with testing defected model piles in the soil in order to study their behavior. In this respect, the results of model pile tests are discussed either geotechnically or structurally according to the type of failure.
Two parameters were studied in order to evaluate the general behavior of defective piles. These parameters include the defect location and the defect type for floating and end bearing pile. The results of the experimental work indicated that the critical case for floating pile is seen to be when the defect of (5%) at the first third of the pile length at which the decrease in the bearing capacity is about (21%), while the decrease in the bearing capacity is found to be (
... Show MoreThis study is based on the basic idea: that human communication does not stop at the limits of words spoken, but extends to include the movements of the body and its members, such as the face, hand, eye, hearing, touch, taste, sensation and the public body.
The human movements represented by polarization, frowns, tattoos, and movements are all auxiliary tools that reach meanings and affect others greatly.
Perhaps their importance is also in their ability to translate what is going on in the soul, and to show it to the outside body members, without the control of the human in many cases, it is thus an important factor in the process of human communication.
The purpose of this study is to show the senses of the senses in the
This tagged research deals with the manifestations of femininity in Mahmoud Fahmy's drawings by studying and monitoring the presence and how women were represented in the drawings of the artist Mahmoud Fahmy. Through the drawings of the expatriate Iraqi artist, Mahmoud Fahmy, in highlighting the manifestations of beauty for women, which constitute a formal characteristic that appears through the body, and Fahmy depicts it in an atmosphere of realism at times and magical realism at other times, as the research consists of four chapters. Through the following question: Did femininity appear in the drawings of the artist Mahmoud Fahmy? The importance of the research is that it sheds light on the manifestations of femininity in the drawings
... Show More