Mobile ad-hoc networks (MANETs) are composed of mobile nodes communicating through wireless medium, without any fixed centralized infrastructure. Providing quality of service (QoS) support to multimedia streaming applications over MANETs is vital. This paper focuses on QoS support, provided by the stream control transmission protocol (SCTP) and the TCP-friendly rate control (TFRC) protocol to multimedia streaming applications over MANETs. In this study, three QoS parameters were considered jointly: (1) packet delivery ratio (PDR), (2) end-to-end delay, (3) and throughput. Specifically, the authors analyzed and compared the simulated performance of the SCTP and TFRC transport protocols for delivering multimedia streaming over MANETs. Two simulation scenarios were conducted to study the impact of traffic load and node speed (mobility) to their performance. Based on the simulation results, the authors found that the PDR and the end-to-end delay of TFRC are slightly better than those of SCTP in both scenarios. Additionally, the performance of SCTP is significantly better than TFRC in terms of throughput.
Objective: Zerumbone (ZER) is a well-known natural compound that has been reported to have anti-cancer effect. Thus, this study investigated the ZER potential to inhibit Thymidine Phosphorylase (TP) and the ability to trigger Reactive oxygen species (ROS)-mediated cytotoxicity in non-small cell lung cancer, NCI-H460, cell line. Material and Method: The antiangiogenic activity for ZER was evaluated by using the thymidine phosphorylase inhibitory test. Reactive oxygen species (ROS) production was determined via DCFDA dye by using flow cytometry. Result and Discussion: ZER was found to be potent TP inhibitory with the IC50 value of 50.3± 0.31 μg/ml or 230±1.42 µM. NCI-H460 cells upon treatment with ZER produced sign
... Show MoreThis study evaluated the knowledge and practice of breast self-examination (BSE), among a sample of educated Iraqi women. The study sample comprised 858 women aged 18–62 years affiliated to 6 major Iraqi universities, categorized according to occupation as teaching staff (11.5%), administrative staff (18.0%) and students (70.5%). Data were collected by a self-completed questionnaire. In all, 93.9% of the women had heard about BSE, the main source of information was television (39.9%), doctors (18.4%) and the awareness campaign of the Iraqi National Breast Cancer Research Programme (11.6%). Only 53.9% of the women practised BSE; the most common excuses by those that did not were lack of knowledge of the significance of BSE (42.0%) and lack
... Show MoreIn the present paper, an eco-epidemiological model consisting of diseased prey consumed by a predator with fear cost, and hunting cooperation property is formulated and studied. It is assumed that the predator doesn’t distinguish between the healthy prey and sick prey and hence it consumed both. The solution’s properties such as existence, uniqueness, positivity, and bounded are discussed. The existence and stability conditions of all possible equilibrium points are studied. The persistence requirements of the proposed system are established. The bifurcation analysis near the non-hyperbolic equilibrium points is investigated. Numerically, some simulations are carried out to validate the main findings and obtain the critical values of th
... Show MoreNon-additive measures and corresponding integrals originally have been introduced by Choquet in 1953 (1) and independently defined by Sugeno in 1974 (2) in order to extend the classical measure by replacing the additivity property to non-additive property. An important feature of non –additive measures and fuzzy integrals is that they can represent the importance of individual information sources and interactions among them. There are many applications of non-additive measures and fuzzy integrals such as image processing, multi-criteria decision making, information fusion, classification, and pattern recognition. This paper presents a mathematical model for discussing an application of non-additive measures and corresp
... Show MoreQ fever is an infectious disease of animals and humans, caused by globally distributed C. burnetii. In Iraq, there are no previous studies associated with the detection of the organism in cattle. An overall of 130 lactating cows were submitted to direct collection of milk samples. Initially, the samples of milk were tested using the molecular polymerase chain reaction (PCR) assay targeting three genes (16S rRNA, IS1111a transposase, and htpB). However, positive results (18.46%; 24/130) were detected only with the 16s rRNA gene. Concerning risk factors, the highest prevalence of C. burnetii was showed in the district of Badra (42.86%), whereas the lowest - in Al-Numaniyah and Al-Suwaira districts (P=0.025). There was no significant v
... Show MoreInvestigation of mesomorphic properties of new 1,3,4-thiadiazolines (which are synthesised via many steps in Scheme 1) was carried out in this study. These compounds are designed to have a heterocyclic unit, a carboxylate linkage group and a polar ether chain at the end of the molecule adjacent to the benzene ring, which enhance the dipolar interactions forces (varied from one to eight carbons) to investigate the association properties of their phases. The structure of the target compounds and the intermediates were confirmed by 1H NMR, 13C NMR, mass and FTIR spectral techniques. Polarised microscopic studies revealed that all the compounds in the series exhibited enantiotropic liquid crystalline properties. This was further confirmed using
... Show MoreCipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared
... Show MoreThe researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes
... Show More