With the recent growth of global populations, main roads in cities have witnessed an evident increase in the number of vehicles. This has led to unprecedented challenges for authorities in managing the traffic of ambulance vehicles to provide medical services in emergency cases. Despite the high technologies associated with medical tracks and advanced traffic management systems, there is still a current delay in ambulances’ attendance in times of emergency to provide patients with vital aid. Therefore, it is indispensable to introduce a new emergency service system that enables the ambulance to reach the patient in the least congested and shortest paths. However, designing an efficient algorithm to plan the best route for an ambulance is still a global goal and a challenge that needs to be solved. This article introduces an Internet of Things emergency services system based on a real-time node rank index (NR-index) algorithm to find the best route for the ambulance to reach the patient and provide the required medical services in emergency cases. The proposed system design copes with the dynamic traffic conditions to guarantee the shortest transport time. For this purpose, a vehicular ad hoc network is employed to collect accurate real-time traffic data. In this article, we suggest two parameters to compromise distance and congestion level. The first is the distance between the patient and the surrounding ambulance vehicles, and the second determines the congestion level to avoid the path with high congestion traffic. The system employs a developed real-time NR-index algorithm to select a suitable ambulance vehicle to respond to emergency cases at a low travel cost with the fastest journey. Finally, our system makes it easier for ambulance vehicles to use the best route and avoid heavy traffic. This allows them to make their way to the patient quickly and increases the chance of saving lives. The simulation results show significant improvements in terms of average travel time, average travel speed, and normalized routing load.
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreThe bit record is a part from the daily drilling report which is contain information about the type and the number of the bit that is used to drill the well, also contain data about the used weight on bit WOB ,revolution per minute RPM , rate of penetration ROP, pump pressure ,footage drilled and bit dull grade. Generally we can say that the bit record is a rich brief about the bit life in the hole. The main purpose of this research is to select the suitable bit to drill the next oil wells because the right bit selection avoid us more than one problems, on the other hand, the wrong bit selection cause more than one problem. Many methods are related to bit selection, this research is familiar with four of thos
... Show Moreيشكل السياق جانبا مهماً في فهم الخطاب والمقصود هنا العرض المسرحي، من خلال ما يمده السياق للمتلقي من مؤشرات، يتم الاعتماد عليها في استكمال المعنى الظاهر بالمعنى المستتر، فالسياق يعتمد في الاصل على المحيط المادي الاجتماعي الذي يتم فيه التواصل وفيه يتعرف المرسل والمتلقي أحدهما على الآخر وتتبلور الصورة التي يحملها الطرفان أحدهما عن الآخر، الى جانب كونه يمثل الاحداث التي سبق لهما أن عاشاها والتبادل القولي
... Show MoreInternet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader u
... Show More