Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conducted to determine the influence of flying altitude. The results indicate that hybrid routing protocols outperform other types of protocols in terms of average throughput. Proactive protocols, on the other hand, have the least jitter.
The Mishrif and Yamama Formation are the main reservoirs in the Garraf oilfield, Nasiriyah city, of the Euphrates Subzone, Mesopotamian Basin, Southern Iraq. The Garraf oilfield structural pattern corresponds with the similar anticline forming the oilfields of Rafidain and Dujaila and is parallel to the main trend of Zagros, indicating simple coaxial deformation.
The petrophysical properties are evaluated using the Interactive Petrophysics V3.5 software. This comprises determining the lithology, mineralogy, and matrix for the investigated reservoirs, as estimating clay volume, total, effective, and secondary porosity, water saturation, permeability, and determining the net pay and gross thickness.
The findings of t
... Show MorePhase-change materials (PCMs) have a remarkable potential for use as efficient energy storage means. However, their poor response rates during energy storage and retrieval modes require the use of heat transfer enhancers to combat these limitations. This research marks the first attempt to explore the potential of dimple-shaped fins for the enhancement of PCM thermal response in a shell-and-tube casing. Fin arrays with different dimensions and diverse distribution patterns were designed and studied to assess the effect of modifying the fin geometric parameters and distribution patterns in various spatial zones of the physical domain. The results indicate that increasing the number of
Objectives: The study aim to evaluate nursing performance during nasogastric tube feeding in neonatal intensive care unit. Methodology: A descriptive study was carried out in Neonatal Intensive Care Unit at al–Batool Teaching Hospital, for the purpose of evaluate of quality of nursing performance for premature baby during nasogastric tube feeding in neonatal intensive care unit. The study consumed the period from 4th of December 2017 to the 24nd of April 2018, Non-probability purposive sample of (25) nurses working in the neonatal intensive care unit. The data were collected through the use of Observational instrument which consist of socio-demographic characteristics, quality of nursing care. Results: The study shows that the majority
... Show MoreThis paper investigated an Iraqi dataset from Korek Telecom Company as Call Detail Recorded (CDRs) for six months falling between Sep. 2020-Feb. 2021. This data covers 18 governorates, and it falls within the period of COVID-19. The Gravity algorithm was applied into two levels of abstraction in deriving the results as the macroscopic and mesoscopic levels respectively. The goal of this study was to reveal the strength and weakness of people migration in-between the Iraqi cities. Thus, it has been clear that the relationship between each city with the others is based on and of mobile people. However, the COVID-19 effects on the people’s migration needed to be explored. Whereas the main function of the gravity model is to
... Show MoreIn this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in
... Show MoreThis paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
The road networks is considered to be one of the determinants that controls to specify the areas of human activities, which it depend on to specify the arrival cost , in addition it is useful to achieve the connectivity for interaction and human activities , and shorten the distance and time between the population and places of service. The density of the road network in any space directly affected by the density of population and the type of economic activities and administrative functions performed by the space. On this basis, the subject of this study is reflected in the quantitative analysis of the roads network in the Governorate of Karbala. The study consists the quantitative analysis for the roads network and the Urban Nodes in th
... Show MoreThe aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More