Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conducted to determine the influence of flying altitude. The results indicate that hybrid routing protocols outperform other types of protocols in terms of average throughput. Proactive protocols, on the other hand, have the least jitter.
Itraconazole (ITZ) is an antifungal drug (BCSII) used for the treatment of local and systemic fungal infections. Furthermore, ITZ used as an antifungal prophylaxis for immunocompromised patients.
The objective of the study is to overcome the two problems of low and pH dependent solubility of ITZ by its preparation as floating microparticles.
Firstly, pH-dependent floating microparticles were prepared using oil in water solvent evaporation method, from which the best one (F7) selected as a best pH-dependent formula with composition of ITZ (200mg),EC (800mg), HPMC 15cps (200mg) and safflower oil (2ml) .Then, F7 was compared with the selected Relatively pH-independent ITZ floating microparticles formula wit
... Show MoreCoumarin derivatives have shown different biological activities, such as antifungal, antibacterial antiinflammatory, and antioxidant activities, besides antibiotic resistance modulating effects, and anti-HIV, hepatoprotective, and antitumor effect. So, new coumarin derivatives (hydrazones and an amide) were synthesized through multisteps reactions. All the synthesized target compounds were characterized by FT-IR spectroscopy, 1HNMR analysis. The compounds then evaluated for their anti-bacterial activity by means of well-diffusion method against two gram-positive bacteria (Staphylococcus aureus, Streptococcus pneumoniae) and two gram-negative bacteria (E.coli and Pseudomonas aeruginosa). The highest activity was demonstr
... Show MoreThis study aimed to determine the measurements and classification of Schneider membrane thickness correlated to age and sex factors using cone beam computed tomography (CBCT). Methods: The study included CBCT images for 100 maxillary sinuses of 50 consecutive patients, and the thickness of the maxillary sinus membrane (Schneiderian membrane) was measured in coronal view from the lowest point in the floor of the maxillary sinus to the highest point. The thickness of the Schneiderian membrane was classified into 4 types. Results: The study result revealed that out of the total cases, 45% of sinus membranes were classified as type 2, while only 10% were classified as type 4. The most frequent type of membrane thickness diagnosed in the age gro
... Show MoreThe objective of the study was to develop microneedle (MN) patch, with suitable properties to ensure the delivery of a therapeutic level of lornoxicam (LXM) in a period suitable to replace parenteral administration in patients, especially those who fear needles. The used polymers were cold water-soluble polyvinyl alcohol (PVA) and polyvinylpyrrolidone (PVP) of low molecular weight with PEG 400 as plasticizer and Tween 80 (to enhance the release) using micro molding technique. Patches were studied for needle morphology, drug content, axial fracture force measurement and drug release while the optimized formulas were further subjected to pH measurement, folding endurance, ex vivo permeation study, histopathology study, stability study and
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreA frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreImage recognition is one of the most important applications of information processing, in this paper; a comparison between 3-level techniques based image recognition has been achieved, using discrete wavelet (DWT) and stationary wavelet transforms (SWT), stationary-stationary-stationary (sss), stationary-stationary-wavelet (ssw), stationary-wavelet-stationary (sws), stationary-wavelet-wavelet (sww), wavelet-stationary- stationary (wss), wavelet-stationary-wavelet (wsw), wavelet-wavelet-stationary (wws) and wavelet-wavelet-wavelet (www). A comparison between these techniques has been implemented. according to the peak signal to noise ratio (PSNR), root mean square error (RMSE), compression ratio (CR) and the coding noise e (n) of each third
... Show More