Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conducted to determine the influence of flying altitude. The results indicate that hybrid routing protocols outperform other types of protocols in terms of average throughput. Proactive protocols, on the other hand, have the least jitter.
Alloys of Bi2[Te1-x Sex]3 were prepared by melting technique with different values of Se percentage (x=0,0.1,0.3,0.5,0.7,0.9 and 1). Thin films of these alloys were prepared by using thermal evaporation technique under vacuum of 10-5 Torr on glass substrates, deposited at room temperature with a deposition rate (12nm/min) and a constant thickness (450±30 nm). The concentrations of the initial elements Bi, Te and Se in the Bi2 [Te1-x Sex]3 alloys with different values of Se percentage (x), were determined by XRF,The morphological and structural properties were determined by AFM and XRD techniques. AFM images of Bi2[Te1-x Sex]3 thin films show that the average diameter and the average surface roughness inc
... Show More
This research addresses: Sharh Usul Al-Bazdawi "Explanation of the Fundamentals for Al-Bazdawi", by studying and investigating, from the beginning of prohibition chapter to its end. The researcher conducted a study about this book stating its significance and introducing the compiler and the commentator. The researcher as well mentioned that the prohibition has a special formula and requires repetition, and he went on explaining that prohibition according to Hanafis does not require absolute corruption of the prohibited matter unless based on an evidence, and that what is condemned as wrong act for itself is considered void and what is condemned as wrong act for external reasons is considered corrupt accor
... Show MoreThis study investigated the outcome of Alstonia boonei stem bark on liver enzymes after inducing the Wistar albino rats with carbon tetrachloride (CCl4). This effect of plant extract was compared with silymarin – a drug commonly used for the treatment of chronic hepatocyte disorder. The plant sample was extracted with ethanol; acute toxicity study of the extract was performed on eighteen Wistar mice, while 30 rats were sacrificed for liver enzymes assay. The rats were divided into six clusters: each cluster has five rats, culster 1 served as control and was given 2 mL/kg b.w - distilled water; clusters 2 – 6 were CCl4 induced. Cluster 2 was untreated but served as the negative control while cluster 3 wa
... Show MoreAim:- to show that not all survival curves without shoulder are not able to repair or have lost the ability for the accumulation of sublethal damage.
Background:- the shoulder of the survival curve is considered as a
region of accumulation of sublethal damage also as an indicator for cell capacity to repair. The size can be influenced by the change ofthe slope of the linear portion of the survival curve.
Results:- we have shown that a survival curve with shoulder size of
1.5 Gy can be a straight line when the slope of the exponential part is changed so the
... Show MoreThe nigra scale, Parasaissetia nigra (Nietner, 1861) (Hemiptera, Coccidae) recorded as a new insect pest attacking fig trees, Ficus carica (Moraceae) in Iraq. It was observed during April 2014 in residential garden at Al-Hurriyah district in Baghdad.
This paper presents an alternative method for developing effective embedded optimized Runge-Kutta (RK) algorithms to solve oscillatory problems numerically. The embedded scheme approach has algebraic orders of 5 and 4. By transforming second-order ordinary differential equations (ODEs) into their first-order counterpart, the suggested approach solves first-order ODEs. The amplification error, phase-lag, and first derivative of the phase-lag are all nil in the embedded pair. The alternative method’s absolute stability is demonstrated. The numerical tests are conducted to demonstrate the effectiveness of the developed approach in comparison to other RK approaches. The alternative approach outperforms the current RK methods
... Show MoreSocial networking sites represent one of the modern communication technologies that have contributed to the expression of public opinion trends towards various events and crises of which security crisis is most important being characterized by its ability to influence the community life of the public. In order to recognize its role in shaping opinions of the educated class of the public that is characterized by a high level of knowledge, culture and having experience in dealing with the media. Its advantage is that they have an active audience by expressing their views on the situations, events, and news published on them as well as expressing their attitudes and sympathy with the events. So a number of questions are included in the ques
... Show MoreThe posterior regions of the jaws usually represent a significant risk for implant surgery. A non-valid assessment of the available bone height may lead to either perforation of the maxillary sinus floor or encroachment of the inferior alveolar nerve and consequently to implant failure. This study aimed to evaluate the reliability of surgeon’s decision in appraising the appropriate implant length, in respect to vital anatomical structures, using panoramic radiographs.
Only implants that are inserted in relation to the maxillary sinus (MS) or the mandibular canal (MC) were enrolled