Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show MoreThe current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the
... Show MoreBack ground: primary nocturnal enuresis (PNE) is a socially distressing condition that can be troubling for children & their families. It affects 15-26% of five years olds. Several approaches are used to treat PNE including behavioral modification, alarms & drug therapy. Aim of the study: to determine the efficacy and safety of nasal desmopressin treatment in children with PNEPatients : fifty-four children with primary nocturnal enuresis with a mean age of ( 8.2) years ( range 6-15), underwent a 2 week observation period followed by entrance into a randomized controlled study, comparing desmopressin & placebo, lasting 4 weeks. The efficacy of the drug was measured in reduction of the number of wet nights per week. The enureti
... Show MoreIn order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T
KE Sharquie, AA Noaimi, WK Al-Janabi, The Iraqi Postgraduate Medical Journal, 2013 - Cited by 3
Background: Acute urinary tract infection is a common bacterial infection causing illness in infants and children. At age of seven, 8% of girls and 2% of boys will have at least one episode. Although drinking water and using home remedies are known to help to flush away bacteria and keeps them from sticking to the bladder wall, researches to test the efficacy and safety of hydrochlorothiazide's diuretic effect as adjuvant to the antibiotics in pediatric age groups are lacking, and so this research was to address this subject.
Objectives: To assess the effectiveness and the safety of hydrochlorothiazide as adjuvant therapy to the antibiotics in treating acute urinary tract infect
... Show More