Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conducted to determine the influence of flying altitude. The results indicate that hybrid routing protocols outperform other types of protocols in terms of average throughput. Proactive protocols, on the other hand, have the least jitter.
Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra
... Show MoreThe approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib
... Show MoreObjectives: The study aim to evaluate nursing performance during nasogastric tube feeding in neonatal intensive care unit. Methodology: A descriptive study was carried out in Neonatal Intensive Care Unit at al–Batool Teaching Hospital, for the purpose of evaluate of quality of nursing performance for premature baby during nasogastric tube feeding in neonatal intensive care unit. The study consumed the period from 4th of December 2017 to the 24nd of April 2018, Non-probability purposive sample of (25) nurses working in the neonatal intensive care unit. The data were collected through the use of Observational instrument which consist of socio-demographic characteristics, quality of nursing care. Results: The study shows that the majority
... Show MoreThe shear strength of soil is one of the most important soil properties that should be identified before any foundation design. The presence of gypseous soil exacerbates foundation problems. In this research, an approach to forecasting shear strength parameters of gypseous soils based on basic soil properties was created using Artificial Neural Networks. Two models were built to forecast the cohesion and the angle of internal friction. Nine basic soil properties were used as inputs to both models for they were considered to have the most significant impact on soil shear strength, namely: depth, gypsum content, passing sieve no.200, liquid limit, plastic limit, plasticity index, water content, dry unit weight, and initial
... Show MoreThe issue of increasing the range covered by a wireless sensor network with restricted sensors is addressed utilizing improved CS employing the PSO algorithm and opposition-based learning (ICS-PSO-OBL). At first, the iteration is carried out by updating the old solution dimension by dimension to achieve independent updating across the dimensions in the high-dimensional optimization problem. The PSO operator is then incorporated to lessen the preference random walk stage's imbalance between exploration and exploitation ability. Exceptional individuals are selected from the population using OBL to boost the chance of finding the optimal solution based on the fitness value. The ICS-PSO-OBL is used to maximize coverage in WSN by converting r
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreThe Ilkhanid Mongols (651-756 AH / 1253-1355 AD) were interested in urbanization and construction in keeping with civilized countries and to have an architectural imprint that competed with the neighboring nations. The Ilkhan Öljeitü Muḥammad Khudābandeh (703-716 AH / 1303-1316 AD), known for his love of building and construction, wanted to have a capital that would immortalize his name and history, so he ordered its construction to compete with contemporary cities, and he summoned workers and engineers from all over the world to contribute to its construction. The city has several educational and service institutions such as schools, ribats, khanqas, mosques, hospitals, markets, and baths, as well as a mausoleum for him, which
... Show MoreObjectives: The study aimed to clarify the role of Al-Sayyid Al-Ajall and his family in the service of the Mongol Empire. They worked to develop its administrative and military institutions, benefiting from their extensive experience in administration, politics, economics, and urban affairs. Due to their capabilities, they received the patronage of Genghis Khan and subsequent generations, earning the confidence of the ruling Mongol authority. As a result, they were granted significant powers within the state. Methods: The study relied on the analytical method to analyze historical texts, compare them with others, and discuss them accurately. Results: The study yielded several results, including the minister's keen interes
... Show MoreIn this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the BE
... Show More