The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing resource usage, managing mobility, ensuring cost‐efficiency, managing interference, and maximizing spectral efficiency. The fast advancement of artificial intelligence (AI) in several domains yields improved performance in contrast to traditional methods. Hence, including AI in 5G standards would enhance performance by catering to diverse end‐user applications. Initially, we provide an overview of concepts such as Industry 4.0, the 5G standard, and recent developments in the sphere of wireless communications in the future. The goal is to use 5G technology to look at current research problems. We present a new architecture for Industry 4.0 and 5G‐compliant smart healthcare systems. We develop and run the proposed model to investigate the current 5G methods using the Network Simulator (NS2). The results of the simulation show that 5G resource management and interference management approaches already in use face challenges including performance trade‐offs.
oday deep ocean life has not been discovered by humans including many secret world things to be explored. The researcher has focused on underwater optical wireless communications using various kinds of complex digital Signal processing most of them used in air and starting applied in underwater communication. The Internet of Things (IoT) uses underwater called Internet of Underwater Things (IoUT) applications to explore the underwater world with other devices. However, the difference in concentration between air and water surfaces is not easy making wireless communication more complicated. Visible light passes the water's surface with scattering and distortion inside the water and each color of light has different attenuation the blue laser
... Show Moreالهدف من الدراسة هو معرفة أثر استراتيجيات التفكير البصري (VTS) على تحصيل طلاب الكلية في مهارات الاتصال باللغة الإنكليزية. ولتحقيق هدف الدراسة تم استخدام التصميم البعدي التجريبي. وتمثلت العينة بـ (70) من طلاب المرحلة الثانية بقسم اللغة الإنجليزية بكلية التربية. وقد تم اختيارهم عشوائياً وتقسيمهم إلى مجموعتين: المجموعة التجريبية والضابطة (35) طالباً في كل مجموعة. ولتحقيق هدف الدراسة تم بناء اختبار تحصيلي لمهارا
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreThe Cenomanian – Turronian sedimentary succession in the south Iraq oil fields, including Ahmadi, Rumaila, Mishrif and Khasib formations have undergone into high-resolution reservoir-scale genetic sequence stratigraphic analysis. Some oil-wells from Majnoon and West-Qurna oil fields were selected as a representative case for the regional sequence stratigraphic analysis. The south Iraqi Albian – Cenomanian – Turronian succession of 2nd-order depositional super-sequence has been analyzed based on the Arabian Plate chronosequence stratigraphic context, properly distinguished by three main chrono-markers (The maximum flooding surface, MFS-K100 of the upper shale member of Nahr Umr Formation, MFS-K140 of the upper Mishrif carbonate
... Show MoreHiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.
Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show More