High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination
... Show MoreScheduling considered being one of the most fundamental and essential bases of the project management. Several methods are used for project scheduling such as CPM, PERT and GERT. Since too many uncertainties are involved in methods for estimating the duration and cost of activities, these methods lack the capability of modeling practical projects. Although schedules can be developed for construction projects at early stage, there is always a possibility for unexpected material or technical shortages during construction stage. The objective of this research is to build a fuzzy mathematical model including time cost tradeoff and resource constraints analysis to be applied concurrently. The proposed model has been formulated using fuzzy the
... Show More<p><span>This research deals with the feasibility of a mobile robot to navigate and discover its location at unknown environments, and then constructing maps of these navigated environments for future usage. In this work, we proposed a modified Extended Kalman Filter- Simultaneous Localization and Mapping (EKF-SLAM) technique which was implemented for different unknown environments containing a different number of landmarks. Then, the detectable landmarks will play an important role in controlling the overall navigation process and EKF-SLAM technique’s performance. MATLAB simulation results of the EKF-SLAM technique come with better performance as compared with an odometry approach performance in terms of measuring the
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreThe ability of beans (Phaseolus vulgaris L.) to uptake three pharmaceuticals (diclofenac, mefenamic acid and metronidazole) from two types of soil (clay and sandy soil) was investigated in this study to explore the human exposure to these pharmaceuticals via the consumption of beans. A pot experiment was conducted with beans plants which were grown in two types of soil for six weeks under controlled conditions. During the experiment period, the soil pore water was collected weekly and the concentrations of the test compounds in soil pore water as well as in plant organs (roots, stems and leaves) were weekly determined.
The results showed that the studied pharmaceuticals were detected in all plant tissues; their concentration
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreCurrent research aims to analyze the relationship and impact of the explanatory variable transcendental leadership, which includes dimensions (values and attitudes, behavior, spirituality, vision and hope/faith) in the responsive variable university performance dimensions (relationships and resources available, human capital development, scientific research, community service). Field research for the leaders of a number of colleges of the University of Baghdad of the deans of the colleges of research and assistants of deans and heads of departments, the main research problem was the important question (what is the role of transcendent leadership in promotin
... Show MoreJurisprudential rules, a broad section to lower the legitimacy of the ruling on the developments of politics, which is increasing day by day, and developments of complex judicial issues, provided that the rule derived from the texts of the legitimate or verbal significance.
And the introduction of jurisprudence rules in the provisions concerning the legitimate policy, the first to take from the provisions of the situation; because the rules of jurisprudence is a summary of the provisions reached by the scholars of the nation after study and scrutiny, which is qualified and largely to cover the need of the owners of public mandates.
The depreciation of the Iraqi dinar against the US dollar, reaching low levels and causing disruptions in the local markets, has had detrimental effects on individuals and companies, particularly those with limited income and the poor. The local currency approached around 1600 dinars per dollar, after the official exchange rate had stabilized at around 1450 dinars per US dollar. This depreciation in the value of the Iraqi dinar can be attributed to financial speculation among currency traders, which directly affected exchange rates and illicit dollar smuggling operations. Bank transfers are also important alongside financial transactions, especially in light of current economic developments in the 21st century. To prevent currency s
... Show More