This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each notion. For ease of comprehension and clarity, we give part of the data as tables and figures. This survey also raises issues for potential future research topics, such as how to integrate VANET with a 5G cellular network and how to use trust mechanisms to enhance security, scalability, effectiveness, and other VANET features and services. In short, this review may aid academics and developers in choosing the key VANET characteristics for their objectives in a single document.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreImage Fusion Using A Convolutional Neural Network
Recently, the theory of Complex Networks gives a modern insight into a variety of applications in our life. Complex Networks are used to form complex phenomena into graph-based models that include nodes and edges connecting them. This representation can be analyzed by using network metrics such as node degree, clustering coefficient, path length, closeness, betweenness, density, and diameter, to mention a few. The topology of the complex interconnections of power grids is considered one of the challenges that can be faced in terms of understanding and analyzing them. Therefore, some countries use Complex Networks concepts to model their power grid networks. In this work, the Iraqi Power Grid network (IPG) has been modeled, visua
... Show MoreAbstract
were determine the problem of current research to answer the question on the consciousness of the Ministry of Agriculture to adopt Staffing strategy and identify the shortcomings as the independent variable, represented by the three dimensions (recruitment , selection, placement) and its impact on high performance, as dependent variable is described in four dimensions (leadership, strategy, structure and processes, culture), in this research were Used analytical descriptive style . This research aims to identify the correlation and impact of Staffing strategy at high-performance in Ministry of Agriculture , To clarify the relationship between
... Show MorePseudomonas aeruginosa is a Gram-negative opportunistic pathogen and a model bacterium for studying virulence and bacterial social traits. While it can be isolated in low numbers from a wide variety of environments including soil and water, it can readily be found in almost any human/animal-impacted environment. It is a major cause of illness and death in humans with immunosuppressive and chronic conditions, and infections in these patients are difficult to treat due to a number of antibiotic resistance mechanisms and the organism’s propensity to form multicellular biofilms. One hundred twenty clinical samples and forty hospital environmental samples (various sources) were collected from hospitals in Baghdad city during the period from Oc
... Show MoreBACKGROUND: Transverse fractures of the patella are important fractures with a wide variety of subtypes, the common incidence in the age group of 20–50 years. Surgical interference aims to achieve a perfect alignment of the joint surface, in addition to rigid fixation of the fracture for early re-habitation and early movement to retain the extensor mechanism of the knee joint. AIM: The aim of this study was to compare the radiological and functional outcomes of the displaced transverse patella fracture in adult patients treated by ORIF using tension band wiring versus cannulated screws with wiring. METHODS: A prospective analytic comparative study was conducted in Al-Kindy Teaching Hospital/Baghdad/Iraq for 18 months from Apr
... Show More