Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreImpact of buildings in Iraq and other countries on the environment is obvious; this problem began to take scientific and humanitarian dimensions in order to reduce and eliminate this problem. This impact can be seen through the energy, water and raw materials consumed for the establishment, operation and maintenance of these buildings, as well as the emissions of hazardous gases and generations of solid wastes.
This work was conducted to assess the current maintenance managerial practice for the governmental buildings to stand on the main obstacle and extrapolation of measures by means of interviews with experts to determine the effective factors and closed questionnaire to state the features and the need for new
... Show More
The idea of this research is the basis of the role exercised by the dimensions of performance management (Performance Planning- performance evaluation- improve the performance and development- feedback - Review and Performance Monitor) In order to achieve the success Organizational Is through the (strategic vision- the operational activity- development of the company- selection of personnel- the company's culture- Leadership and Management- Personal Development - Assessment and Review).And The research aims to identify the extent of the responsibility of performance management in achieving success Organizational through main hypotheses branched out by the sub-hypotheses to knowing out the&nbs
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreObjectives: to evaluate the role of conservative, decompression, spine fixation in management of closed spinal injury.
Methods: The study was conducted at Specialized Surgical hospital and Al-Kadhemayia Teaching Hospital, in the period between July 2003 and July 2005.The study included 61 patients categorized Into many groups according level of vertebral injury (cervical, cervicodorsal, dorsal, dorsolumbar, Lumbar and lumbosacral), type of injury (compressed fracture, burst fracture and fracture dislocation) And according the severity into three groups as G1( complete motor paralysis and sensory loss ) G2 ( complete motor paralysis and incomplete sensory loss) and G3 ( incomplete motor paralysis And incomplete sensory loss ).The metho
Background: Civil violence in Iraq has reached an epidemic level during the last few years, and an increasing number of urological injuries were faced in dealing with unprotected civilians who were exposed daily to violence in streets, at homes, and at work. Bladder injuries are an example of injuries which were faced rarely before but increasingly now, if not dealt with properly such injuries may end with serious morbidity and even crippling, on the other hand proper management will greatly decrease morbidity and mortality of such injuries.
Patients and method: over the period from March 2004 to June 2005 all the patients triaged to the emergency unit of Medical City with genitourinary trauma were includ
Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreThis research focused on clarifying the relationship strategic decisions for operations management & performance excellence organizational, The research emerges from a problem which explained by many application questions. Special questionnaire has been prepared for this purpose distributed (72) to sample of management levels (Top, middle) in the General company for mining industries and aquatic Insullation & the General company of batteries industry, The research has tried to test a number hypotheses related to the relation and regression among the variables of the research, and the differences among the <
... Show More