Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical. RF powered devices including sensor nods can be used potentially in ultra-low-power areas to extend the life battery span [4]. Moreover, modern biomedical implantable devices require power source channels for charging to prolong the lifetime of the implanted device and reduce the chances of battery replacements [5]. Furthermore, the ambient electromagnetic energy recycling possibility in dense urban zones population was significantly explored in [6]. Therefore, power conversion circuits to extract enough DC power from the incident electromagnetic waves for passive devices become urgent demand [7]. RF energy harvesters, generally, are consistent with an antenna, a power management circuit, and a rectifier [3]. The antenna part is the responsible element for collecting the RF energy from radiating sources. The appropriate antenna design is the one with a wide bandwidth of omnidirectional radiation patterns to collect the energy from a different direction at any frequency [8].
It is general known that any design in various fields such as the interior design in the field of spaces interior for the public and specific buildings that is concern about the use of humans resident , as well as other considerations relating to the organization of design elements and lines of locomotors activity and the validity of appropriate receiving to provide comfort and achieve the requirements of the position in the space of restaurants field of research.
The researcher choose the title of this study (processors design career in public spaces), the analytical study of the spaces of restaurants, as one of the public spaces that are running in their general environment of people in various strata , ages and other levels , whic
If the Industrial Revolution has enabled the replacement of humans with machines, the digital revolution is moving towards replacing our brains with artificial intelligence, so it is necessary to consider how this radical transformation affects the graphic design ecosystem. Hence, the research problem emerged (what are the effects of artificial intelligence on graphic design) and the research aimed to know the capabilities and effects of artificial intelligence applications in graphic design, and the study dealt in its theoretical framework with two main axes, the first is the concept of artificial intelligence, and the second is artificial intelligence applications in graphic design. The descriptive approach adopted a method of content
... Show MoreThe exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh
... Show MoreObjective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physici
... Show MoreThis abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreDocetaxel is an effective treatment approved for many types of cancers, but its effectiveness in clinical practice can be compromised by significant occurrence of adverse drug reactions. The aim of the current study was to measure the distribution of adverse drug reactions of docetaxel reported in Iraq and to assess the causality, severity, seriousness, preventability, expectedness and outcome of these adverse reactions. A retrospective study conducted on individual case safety reports from the Iraqi Pharmacovigilance Center / Ministry of Health. The study included 118 individual case safety report containing 236 adverse drug reactions.
Most of the adverse drug reactions were related to skin and subcutaneous tissue disorders(26.7%), f
Cancer is one of the critical health concerns. Health authorities around the world have devoted great attention to cancer and cancer causing factors to achieve control against the increasing rate of cancer. Carcinogens are the most salient factors that are accused of causing a considerable rate of cancer cases. Scientists, in different fields of knowledge, keep warning people of the imminent attack of carcinogens which are surrounding people in the environment and may launch their attack at any moment. The present paper aims to investigate the linguistic construction of the imminent carcinogen attack in English and Arabic scientific discourse. Such an investigation contributes to enhancing the scientists’ awareness of the linguistic co
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show More