Lawful protection of the human gene conceded a moral concern regarding the future of existence human. After the discovery of the human genetic map, scientific experiments and research related to the human gene increased, negative applications of genetic engineering in particular that violate essential human rights, the right to human dignity to be specific. These practices represent actual challenges to the existence and diversity of current and future generations. Therefore, the presence of legal rules at the domestic and global levels is an absolute necessity to prohibit these threats and determine civil and criminal accountability for those who infringe any laws related to this issue.
Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreThis work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreThe most important function of a prosthetic hand is their ability to perform tasks in a manner similar to a natural hand, so it is necessary to perform kinematic analysis to determine the performance and the ability of the prosthetic human finger design to work normally and smoothly when it's drive by two sets of links that embedded in its structure and pulled by a servomotor, so the Denvit-Hartenberg method was used to analyse the forward kinematics for the prosthetic finger joints to deduction the trajectory of the fingertip and the velocity of the joints was computed by using the Jacobian matrix. The prosthetic finger was modelled by the Solidwork - 2018 program and the results of kinematics were verified using MATLAB. The analys
... Show MoreThe performance and durability of the asphalt pavement structure mainly depend on the strength of the bonding between the layers. Such a bond is achieved through the use of an adhesive material (tack coat) to bond the asphalt layers. The main objective of this study is to evaluate the effect of moisture in conjunction with repeated traffic loads on the strength of the bonding between asphalt layers using two types of tack coats with different application rates. Using the nominal maximum size of aggregate (NMAS), the layers were graded (25/19) and (19/9.5) mm. The slabs of multilayer asphalt concrete were prepared using a roller compactor using two types of tack coats to bond between layers, namely rapid curing cut back a
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreThe advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC) method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages
... Show More