As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficient route planning algorithm to attain a globally optimal vehicle control is still a challenge that needs to be solved, especially when the unique preferences of drivers are considered. The aim of this paper is to establish an accident management system that makes use of vehicular ad hoc networks coupled with systems that employ cellular technology in public transport. This system ensures the possibility of real-time communication among vehicles, ambulances, hospitals, roadside units, and central servers. In addition, the accident management system is able to lessen the amount of time required to alert an ambulance that it is required at an accident scene by using a multihop optimal forwarding algorithm. Moreover, an optimal route planning algorithm (ORPA) is proposed in this system to improve the aggregate spatial use of a road network, at the same time bringing down the travel cost of operating a vehicle. This can reduce the incidence of vehicles being stuck on congested roads. Simulations are performed to evaluate ORPA, and the results are compared with existing algorithms. The evaluation results provided evidence that ORPA outperformed others in terms of average ambulance speed and travelling time. Finally, our system makes it easier for ambulance to quickly make their way through traffic congestion so that the chance of saving lives is increased.
The research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost
... Show MoreAl2O3 and Al2O3–Al composite coatings were deposited on steel specimens using Oxy-acetylene gas thermal spray gun. Alumina was mixed with Aluminum in six groups of concentrations (0, 5, 10,12,15 and 20% ) Al2O3, Specimens were tested for corrosion using Potentiodynamic polarization technique. Further tests were conducted for the effect of temperature on polarization curve and the hardness tests for the coated specimens. At first, Modelling was carried out using MINITAB-19, least square method, as a 2nd degree nonlinear model, bad results were achieved because of the high nonlinearity. Better result w
In this golden age of rapid development surgeons realized that AI could contribute to healthcare in all aspects, especially in surgery. The aim of the study will incorporate the use of Convolutional Neural Network and Constrained Local Models (CNN-CLM) which can make improvement for the assessment of Laparoscopic Cholecystectomy (LC) surgery not only bring opportunities for surgery but also bring challenges on the way forward by using the edge cutting technology. The problem with the current method of surgery is the lack of safety and specific complications and problems associated with safety in each laparoscopic cholecystectomy procedure. When CLM is utilize into CNN models, it is effective at predicting time series tasks like iden
... Show MoreThis report explores emerging techniques to boost multimedia transfer effectiveness, given the escalating need for improved quality and performance in multimedia interactions. The analysis involves a thorough literature assessment and comparison of present strategies to pinpoint key tendencies and propose novel approaches. The methodology involves examining recent technological enhance ments in video coding standards, quality appraisal methods, and compression tech niques. Specific domains investigated comprise firmware component architectures, 4D indexing structures, and iterative filtering frameworks. The study in addition weighs tradeoffs between video quality, encoding intricacy, and bitrate demands. Key determinations consist of
... Show MoreThe paper generates a geological model of a giant Middle East oil reservoir, the model constructed based on the field data of 161 wells. The main aim of the paper was to recognize the value of the reservoir to investigate the feasibility of working on the reservoir modeling prior to the final decision of the investment for further development of this oilfield. Well log, deviation survey, 2D/3D interpreted seismic structural maps, facies, and core test were utilized to construct the developed geological model based on comprehensive interpretation and correlation processes using the PETREL platform. The geological model mainly aims to estimate stock-tank oil initially in place of the reservoir. In addition, three scenarios were applie
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show More