Neurosurgery theater-based learning: Etiquette and preparation tips for medical students
...Show More Authors
A high power N2 laser of the three stage-Blumlein circuit designed, which consist two identical electrodes, four capacitors and three spark gaps which designed discharge geometry with minimum inductance. This system gives a maximum energy 18 mJ with a pulse time 6.65 ns and wave length 337.1 nm. The distance between spark gap terminals has large effect on the output energy. The ideal distance were 11 mm between the terminals for the first spark gap and 4 mm between the terminals for the second spark gap, the distance between the terminals of the spark gaps has a significant effect on the resulting energy, where the energy decreases when the distance between the terminals of the first and second s
... Show MoreThe current research seeks to know the difficulties in memorizing literary texts with fourth grade students from teachers’ point of view of and students
The research contains a community of (10,870) students from schools affiliated to the Directorate of Karkh, second and the number of schools for boys and girls (79) School and the number of teachers (349) who are specialized in teaching Arabic language to fourth grade preparatory students and there was a section of a randomly sample of each of the students, teachers and schools .
Some actions which can be listed below:-The survey which was done by the researcher for the views of the two samples from teachers and students as the number of teachers covered in this research (20) and
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreThe spatial assessment criteria system for hybridizing renewable energy sources, such as hybrid solar-wind farms, is critical in selecting ideal installation sites that maximize benefits, reduce costs, protect the environment, and serve the community. However, a systematic approach to designing indicator systems is rarely used in relevant site selection studies. Therefore, the current paper attempts to present an inclusive framework based on content validity to create an effective criteria system for siting wind-solar plants. To this end, the criteria considered in the related literature are captured, and the top 10 frequent indicators are identified. The Delphi technique is used to subject commonly used factors to expert judgme
... Show MoreThe Internet of Things (IoT) is a network of devices used for interconnection and data transfer. There is a dramatic increase in IoT attacks due to the lack of security mechanisms. The security mechanisms can be enhanced through the analysis and classification of these attacks. The multi-class classification of IoT botnet attacks (IBA) applied here uses a high-dimensional data set. The high-dimensional data set is a challenge in the classification process due to the requirements of a high number of computational resources. Dimensionality reduction (DR) discards irrelevant information while retaining the imperative bits from this high-dimensional data set. The DR technique proposed here is a classifier-based fe
... Show MoreExtractive multi-document text summarization – a summarization with the aim of removing redundant information in a document collection while preserving its salient sentences – has recently enjoyed a large interest in proposing automatic models. This paper proposes an extractive multi-document text summarization model based on genetic algorithm (GA). First, the problem is modeled as a discrete optimization problem and a specific fitness function is designed to effectively cope with the proposed model. Then, a binary-encoded representation together with a heuristic mutation and a local repair operators are proposed to characterize the adopted GA. Experiments are applied to ten topics from Document Understanding Conference DUC2002 datas
... Show MoreSelf-repairing technology based on micro-capsules is an efficient solution for repairing cracked cementitious composites. Self-repairing based on microcapsules begins with the occurrence of cracks and develops by releasing self-repairing factors in the cracks located in concrete. Based on previous comprehensive studies, this paper provides an overview of various repairing factors and investigative methodologies. There has recently been a lack of consensus on the most efficient criteria for assessing self-repairing based on microcapsules and the smart solutions for improving capsule survival ratios during mixing. The most commonly utilized self-repairing efficiency assessment indicators are mechanical resistance and durab
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreArtificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose
... Show More