The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing resource usage, managing mobility, ensuring cost‐efficiency, managing interference, and maximizing spectral efficiency. The fast advancement of artificial intelligence (AI) in several domains yields improved performance in contrast to traditional methods. Hence, including AI in 5G standards would enhance performance by catering to diverse end‐user applications. Initially, we provide an overview of concepts such as Industry 4.0, the 5G standard, and recent developments in the sphere of wireless communications in the future. The goal is to use 5G technology to look at current research problems. We present a new architecture for Industry 4.0 and 5G‐compliant smart healthcare systems. We develop and run the proposed model to investigate the current 5G methods using the Network Simulator (NS2). The results of the simulation show that 5G resource management and interference management approaches already in use face challenges including performance trade‐offs.
Protection of the oil pipelineswhich extracted from the wells was found to shut the well and prevent the leakage of oil when broken using safety valve. This valve is automatically activated by loss of pressure between the well and pipelines, which take the pressure, signal from hydraulic pressure sensor through pressure control valve which has constant or variable value but it is regulated manually. The manual regulatory process requires the presence of monitoring workers continuously near the wells which are always found in remote areas. In this paper, a smart system has been proposed that work with proportional pressure control valve and also electronic pressure sensor through Arduino controller, which is programmed in a way that satisfie
... Show MoreThe aim of this study is to develop a novel framework for managing risks in smart supply chains by enhancing business continuity and resilience against potential disruptions. This research addresses the growing uncertainty in supply chain environments, driven by both natural phenomena-such as pandemics and earthquakes—and human-induced events, including wars, political upheavals, and societal transformations. Recognizing that traditional risk management approaches are insufficient in such dynamic contexts, the study proposes an adaptive framework that integrates proactive and remedial measures for effective risk mitigation. A fuzzy risk matrix is employed to assess and analyze uncertainties, facilitating the identification of disr
... Show MoreIn this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.
A novel fractal design scheme has been introduced in this paper to generate microstrip bandpass filter designs with miniaturized sizes for wireless applications. The presented fractal scheme is based on Minkowski-like prefractal geometry. The space-filling property and self-similarity of this fractal geometry has found to produce reduced size symmetrical structures corresponding to the successive iteration levels. The resulting filter designs are with sizes suitable for use in modern wireless communication systems. The performance of each of the generated bandpass filter structures up to the 2nd iteration has been analyzed using a method of moments (MoM) based software IE3D, which is widely adopted in microwave research and in
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreAn assembled pulsed Nd:YAG laser-robot system for spot welding similar and dissimilar metals is presented in this paper. The study evaluates the performance of this system through investigating the possibility and accuracy of executing laser spot welding of 0.2 mm in thickness stainless steel grade AISI302 to 0.5 mm in thickness low carbon steel grade AISI1008. The influence of laser beam parameters (peak power, pulse energy, pulse duration, repetition rate, and focal plane position on the final gained best results are evaluated. Enhancement of the experimental results was carried by a computational simulation using ANSYS FLUENT 6.3 package code.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More
Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos
... Show MoreThis study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin
Nahrawan clay deposits lies in Diyala governorate , 65 Km, NE of Baghdad , according to the previous work in this field, in which they study the reserve belong to category of investigation ( C2 & C1 ) , we choice the proper area to investigation of category (B) with drill net( 200x 200m ) to rise the amount of reserve. The investigation work included drilling (116) boreholes of total depth ranges from (10.0-12.55m) , showed mainly clayey and silty deposits with little sand , and the typical borehole (648) represents all types of sediment in the area , and most of boreholes without sandy deposits , and all of these deposits is Quaternary sediment which is consist of two main sedimentary cycles ( the Pleistocene & Holocene ) . Chemical a
... Show More