Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destination node via multi-hop routing techniques. An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). The proposed algorithm can adapt to significant changes that may occur in the urban vehicular environment. This algorithm works by selecting an optimal route on the basis of hop count and link duration for delivering data from source to destination, thereby satisfying various quality of service considerations. The validity of the proposed algorithm is investigated by its comparison with ARP-QD protocol, which works on the mechanism of optimal route finding in VANETs in urban environments. Simulation results reveal that the proposed ESRA-MD algorithm shows remarkable improvement in terms of delivery ratio, delivery delay, and communication overhead.
The interactive websites are the interaction between the product and the user, and interactive design is based on the user interface for communication and how the interface responds to the user and how to help him to achieve his goals and enjoy the use of the interface. The interactive design is based on the design of interactive programs, i.e., programs that directly interact with the user, taking into account the different culture of the audience, the age group and many other factors. An example for the use of the user interface: Web designs, smartphone application designs and it even includes computer operating systems and electronic game interface. The interaction is the communication between the source and the receiver. The we
... Show MoreStable isotopes 18O/16O and 13C/12C in the carbonate rocks of the Mishrif Formation are examined here to define the depositional characters in the basin includes paleo temperatures and paleo depth. The Mishrif formation (Cenomanian – Early Turonian) has extensive distribution in Iraq and Middle East. Mishrif Formation composed of organic detrital limestone. Four boreholes in four oilfields, Noor – well (11), Amarah – well (14), Buzurgan – well (24), Halfaya – well (8), in south east of Iraq have been studied. The studied samples have negative δ18O isotope values studied well, with Average (-4.11‰), (-4.47‰), (-4.48‰), (-4.18‰) in the studied wells res
... Show MoreBackground: Osteoporosis is an extra-articular complication of rheumatoid arthritis that results in increased risk of fractures and associated morbidity, mortality, and healthcare costs. Objective: To evaluate changes in bone mineral density in a sample of rheumatoid arthritis (RA) patients on biological (anti tumor necrosis factor (TNF) alpha) and non-biological agent disease modifying antirheumatic drugs (DMARDs). Patients and Methods: A cross sectional study enrolled 60 RA patients diagnosed by rheumatologist according to the 2010 American College of Rheumatology/European League Against Rheumatism (2010 ACR/EULAR) classification criteria for RA. Thirty patient on biological agent (anti TNF alpha) and 30 patient on non-biological agent (D
... Show MoreSolid waste is a major issue in today's world. Which can be a contributing factor to pollution and the spread of vector-borne diseases. Because of its complicated nonlinear processes, this problem is difficult to model and optimize using traditional methods. In this study, a mathematical model was developed to optimize the cost of solid waste recycling and management. In the optimization phase, the salp swarm algorithm (SSA) is utilized to determine the level of discarded solid waste and reclaimed solid waste. An optimization technique SSA is a new method of finding the ideal solution for a mathematical relationship based on leaders and followers. It takes a lot of random solutions, as well as their outward or inward fluctuations, t
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreRegression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh
... Show MoreIdentification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show More