Electronic properties such as density of state, energy gap, HOMO (the highest occupied molecular orbital) level, LUMO (the lowest unoccupied molecular orbital) level and density of bonds, as well as spectroscopic properties like infrared (IR), Raman scattering, force constant, and reduced masses for coronene C24, reduced graphene oxide (rGO) C24O5and interaction between C24O5and NO2gas molecules were investigated. Density functional theory (DFT) with the exchange hybrid function B3LYP with 6-311G** basis sets through the Gaussian 09 W software program was used to do these calculations. Gaussian view 05 was em
... Show MoreBackground: Genioglossus advancement is a surgical procedure to advance the tongue in some patients with obstructive sleep apnea syndrome.The important step in this procedure is that of accurately capturing the bone segment attached to the genioglossus muscle to avoid complications such as mandibular fracture, devitalization of the inferior incisor roots, and incomplete incorporation of the genioglossus Materials and Method: Computed tomography scans were taken for 53 Iraqi adult patients (28 male and 25 female) range from (18-35) years with skeletal class I classification and intact anterior mandible dentition included in this study using sagittal and axial sections. The measurements were done for genial tubercle and anterior mandibular re
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish th
... Show More