The current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Reference Point Group Model) and MGM (Manhattan Grid Model) mobility models above CBR traffic sources. The results of Reference Point Group Model simulation illuminate that routing protocol performance is best with RPG mobility model than other models.
In Baghdad city, Iraq, the traffic volumes have rapidly grown during the last 15 years. Road networks need to reevaluate and decide if they are operating properly or not regarding the increase in the number of vehicles. Al-Jadriyah intersection (a four-leg signalized intersection) and Kamal Junblat Square (a multi-lane roundabout), which are two important intersections in Baghdad city with high traffic volumes, were selected to be reevaluated by the SIDRA package in this research. Traffic volume and vehicle movement data were abstracted from videotapes by the Smart Traffic Analyzer (STA) Software. The performance measures include delay and LOS. The analysis results by SIDRA Intersection 8.0.1 show that the performance of the roundab
... Show Moret
The research deals with the statement of the importance of unanimous in Islamic Sharia in terms of being the third source of Islamic legislation after the Holy Qur’an and the Sunnah of the Prophet, and the extent of interest of the scholars of interpretation in it, and those who took great interest in mentioning what was agreed upon in every site that necessitated mentioning its issues within, or mentioning an event that has encountered an unanimous, and in various sciences, to extract and extrapolate Sharia rules when these rules are lost in the texts, because it is based on them and derived from them. Among these distinguished scholars is Muhammad bin Jarir al-Tabari. Besides, the research discusses in
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show MoreFeedback on students’ assignments can be done in many different ways. Nowadays, the growing number of students at universities has increased the burden on the instructors to give feedback on students’ writings quickly and efficiently. As such, new methods of modern online automated feedback tools, such as Hemingway app and ecree,are used to assist and help instructors. Hence, this research is an explanatory study to examine the effect of using the online automated feedback on some Iraqi EFL learners’ writings at the university level. The study comprised 60 students enrolled in an English language course at the University of Anbar. They were divided randomly into two groups, experi
... Show MoreThe objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high
... Show More
In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two. The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.
The interest in pre-service teacher training has become influential in teaching English as a foreign language, and the purpose of this training course is to prepare qualified teachers to teach effectively through the application of this technique by undergraduate students. This research aims to find out the effect of using the seven principles of good practice as a teaching technique on the fourth stage student-teachers’ performance at the College of Education for Women/University of Baghdad, during the academic year 2017-2018. The sample includes (60) students selected according to the stratified sampling method. The observational checklist used by the department to assess the student teachers’ performance during the practicum perio
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show More