Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
Este breve estudio expone algunas erratas gramaticales y semánticas en dos versiones árabes de la novela El amor en los tiempos de cólera del gran novelista colombiano Gabriel García Márquez, las dos versiones árabes son: la versión 1 (por el traductor Saleh Almani) y la versión 2 (por el traductor Ahmed Magdi). Identifica estas erratas explicando cada caso de ambas versiones. Además determinar la versión más aceptable y satisfactoria
This study proposes a hybrid predictive maintenance framework that integrates the Kolmogorov-Arnold Network (KAN) with Short-Time Fourier Transform (STFT) for intelligent fault diagnosis in industrial rotating machinery. The method is designed to address challenges posed by non-linear and non-stationary vibration signals under varying operational conditions. Experimental validation using the FALEX multispecimen test bench demonstrated a high classification accuracy of 97.5%, outperforming traditional models such as SVM, Random Forest, and XGBoost. The approach maintained robust performance across dynamic load scenarios and noisy environments, with precision and recall exceeding 95%. Key contributions include a hardware-accelerated K
... Show MoreBackground: Tumor associated tissue eosinophilia (TATE) has been described in a variety of neoplasms. In regard to squamous cell carcinoma, some studies worldwide done to assess stromal eosinophilia in oral and cervical squamous cell carcinoma. The objectives of this study is to evaluate the association of stromal eosinophilic infiltration of cutaneous squamous cell carcinoma and to detect the significance of this association. Aim of the study The aim of our study is to establish the relationship between the degree of stromal eosinophilia and the level of invasion and the histological grade in cutaneous squamous cell carcinoma. Methods: In this retrospective study done at the histopathology department of al Wasity teaching hospital for orth
... Show MoreBackground: Tumor associated tissue eosinophilia (TATE) has been described in a variety of neoplasms. In regard to squamous cell carcinoma, some studies worldwide done to assess stromal eosinophilia in oral and cervical squamous cell carcinoma. The objectives of this study is to evaluate the association of stromal eosinophilic infiltration of cutaneous squamous cell carcinoma and to detect the significance of this association.
Aim of the study
The aim of our study is to establish the relationship between the degree of stromal eosinophilia and the level of invasion and the histological grade in cutaneous squamous cell carcinoma.
Methods: In this retrospective study
... Show MoreFor the period from February 2014 till May 2014, one hundred and nine lactose fermenter clinical isolates from different samples (urine, stool, wound swab, blood, and sputum) were collected from Alyarmok, Alkadimiya, and Baghdad teaching hospitals at Baghdad governorate. Identification of all Klebsiella pneumoniae isolates were carried out depending on macroscopic, microscopic characterizations, conventional biochemical tests, and Api 20E system. Fifty-three (48.62%) isolates represented K. pneumoniae; however, 51.73% represented other bacteria. Susceptibility test was achieved to all fifty-three K. pneumoniae isolates using five antibiotic disks (Ceftazidime, Ceftriaxone, Cefotaxime, Imipenem, and Meropenem). Most of tested isolates (90
... Show MorePersistence of antibiotics in the aquatic environment has raised concerns regarding their potential influence on potable water quality and human health. This study analyzes the presence of antibiotics in potable water from two treatment plants in Baghdad City. The collected samples were separated using a solid-phase extraction method with hydrophilic-lipophilic balance (HLB) cartridge before being analyzed. The detected antibiotics in the raw and finished drinking water were analyzed and assessed using high-performance liquid chromatography (HPLC), with fluorometric detector and UV detector. The results confirmed that different antibiotics including fluoroquinolones and
This research aims to present a proposed model for disclosure and documentation when performing the audit according to the joint audit method by using the questions and principles of the collective intelligence system, which leads to improving and enhancing the efficiency of the joint audit, and thus enhancing the confidence of the parties concerned in the outputs of the audit process. As the research problem can be formulated through the following question: “Does the proposed model for disclosure of the role of the collective intelligence system contribute to improving joint auditing?”
The proposed model is designed for the disclosure of joint auditing and the role
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show More