The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here
... Show MoreIn this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
The present study was conducted as atrial to treat secondary hydatidosis in white mice of species Mus musculus. (Balb/c strain), experimentally infected with secondary hydatid cysts of sheep origin. The immunization process was carried by using CF/PS antigen which consist hydatid cyst fluid (CF) antigen, and protoscolices (PS) antigen mixed together and by using two concentrations 7.5, 15 mg/ml. Then derivatives of Benzimidazole, Mebendazole (M) and drugs Albendazole (A) were used 10 and 40 μm/gm body weight respectively. The mixture of drugs was used one week after challenged dose. Criteria taken into consideration to define the activity of the immunization and chemotherapy in this study were reduction in the numeral of cysts, the coeffic
... Show MoreBackground: Obesity tends to appear in modern societies and constitutes a significant public health problem with an increased risk of cardiovascular diseases.
Objective: This study aims to determine the agreement between actual and perceived body image in the general population.
Methods: A descriptive cross-sectional study design was conducted with a sample size of 300. The data were collected from eight major populated areas of Northern district of Karachi Sindh with a period of six months (10th January 2020 to 21st June 2020). The Figure rating questionnaire scale (FRS) was applied to collect the demographic data and perception about body weight. Body mass index (BMI) used for ass
... Show MoreAbstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreCerium oxide (CeO2), or ceria, has gained increasing interest owing to its excellent catalytic applications. Under the framework of density functional theory (DFT), this contribution demonstrates the eect that introducing the element nickel (Ni) into the ceria lattice has on its electronic, structural, and optical characteristics. Electronic density of states (DOSs) analysis shows that Ni integration leads to a shrinkage of Ce 4f states and improvement of Ni 3d states in the bottom of the conduction band. Furthermore, the calculated optical absorption spectra of an Ni-doped CeO2 system shifts towards longer visible light and infrared regions. Results indicate that Ni-doping a CeO2 system would result in a decrease of the band gap. Finally,
... Show MoreThis study aims to encapsulate atenolol within floating alginate-ethylcellulose beads as an oral controlled-release delivery system using aqueous colloidal polymer dispersion (ACPD) method.To optimize drug entrapment efficiency and dissolution behavior of the prepared beads, different parameters of drug: polymer ratio, polymer mixture ratio, and gelling agent concentration were involved.The prepared beads were investigated with respect to their buoyancy, encapsulation efficiency, and dissolution behavior in the media: 0.1 N HCl (pH 1.2), acetate buffer (pH 4.6) and phosphate buffer (pH 6.8). The release kinetics and mechanism of the drug from the prepared beads was investigated.All prepare
... Show More