The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing resource usage, managing mobility, ensuring cost‐efficiency, managing interference, and maximizing spectral efficiency. The fast advancement of artificial intelligence (AI) in several domains yields improved performance in contrast to traditional methods. Hence, including AI in 5G standards would enhance performance by catering to diverse end‐user applications. Initially, we provide an overview of concepts such as Industry 4.0, the 5G standard, and recent developments in the sphere of wireless communications in the future. The goal is to use 5G technology to look at current research problems. We present a new architecture for Industry 4.0 and 5G‐compliant smart healthcare systems. We develop and run the proposed model to investigate the current 5G methods using the Network Simulator (NS2). The results of the simulation show that 5G resource management and interference management approaches already in use face challenges including performance trade‐offs.
Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreAttack stream cipher system , using cipher text only , depends on the characteristics of plain teKt language and the randomness of the key , that used in encryption , without having detailed k.nuwh:dgt:: uf cipher algorithm by benefiting from the balance between O's and I' in the key to reduce the probability of key space.
After the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings
... Show MoreThe study aims budget in grades use of smart phones to individuals (sample) according variable sex (males and females) and used researcher descriptive analytical method consisted sample of (300) students have chosen the way stratified random, and the study variables (academic achievement of students, sex and the use of Smart phones) resolution was adopted as a tool for data collection. The most important results of the study that females are more commonly used for smart phones, as well as the existence of a positive relationship between the inverse statistically significant use of smart phones and the rate of school for students and the use of smart phones h
... Show MoreBackground: Occupational exposure to hazardous drugs occurs in all aspects of anticancer drug handling. Proper recommendations and guidelines should be applied to control and reduce exposure. Objective: To assess pharmacists' knowledge and practice regarding the safe handling of anticancer drugs. Methods: A cross-sectional study was conducted at seven major hospitals in Baghdad City, Iraq, from December 2023 to February 2024. A pre-designed questionnaire was given to pharmacists who handled anticancer drugs in chemotherapy units. The questionnaire comprises sociodemographic data, knowledge of the safe handling of cytotoxic drugs and thoughts about exposure and risk, practices for safely handling cytotoxic drugs, and challenges for s
... Show MoreA method is developed for the determination of iron (III) in pharmaceutical preparations by coupling cloud point extraction (CPE) and UV-Vis spectrophotometry. The method is based on the reaction of Fe(III) with excess drug ciprofloxacin (CIPRO) in dilute H2SO4, forming a hydrophobic Fe(III)- CIPRO complex which can be extracted into a non-ionic surfactant Triton X-114, and iron ions are determined spectrophotometrically at absorption maximum of 437 nm. Several variables which impact on the extraction and determination of Fe (III) are optimized in order to maximize the extraction efficiency and improve the sensitivity of the method. The interferences study is also considered to check the accuracy of the procedure. The results hav
... Show MoreData hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image
... Show MoreWith the advancement of technology ,the study of cross-cultural communication via on line has become an important and researchable topic in linguistic theory and its applications.The aims of this study are two- fold (a) exploring the influence of cultural diversity on on-line interaction between American native speakers (NSs) and Iraqi non-native speakers (NNSs) of English which, together with other factors might potentially lead to what Thomas(1983) calls "pragmatic failure" (PF), a main cause of communication breakdowns and (b) specifying which type of PF occurs more frequently between the two groups along with the reasons behind such failures. To achie
... Show MoreModern critical theories revealed polemical views about the reality of the existence of communication - as a necessity for building a deliberative discourse - in the theater or not. To the theory of communication with all the conditions it imposes on thinking, interaction, and emancipation of selves in different contexts.
Therefore, the current research included four chapters, the first chapter dealt with the research problem, which was represented in (the philosophy of sensory and physical communication in theatrical performance), and the first chapter included the importance of the research, its goal and its limits, and ended with defining the terminology, and the second chapter included (theoretical framework) the first topic (ph