At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThe influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic
... Show MoreAuthentic materials are the most important tools that the teacher could use in class in order to make teaching go smoothly and effectively in transmitting the necessary knowledge to all students. This research has investigated experimentally the effect of using authentic materials in teaching English as a foreign Language, because a number of studies point out that the use of authentic materials is regarded a useful means to motivate learners, arouse their interest and expose them to the real language they will face in real life situations.
It is hypothesis that there is no statistical significance difference between the experimental group who taught English as a foreign language by using the authentic materials with those
... Show MoreThe presented study investigated the scheduling regarding jobs on a single machine. Each job will be processed with no interruptions and becomes available for the processing at time 0. The aim is finding a processing order with regard to jobs, minimizing total completion time , total late work , and maximal tardiness which is an NP-hard problem. In the theoretical part of the present work, the mathematical formula for the examined problem will be presented, and a sub-problem of the original problem of minimizing the multi-objective functions is introduced. Also, then the importance regarding the dominance rule (DR) that could be applied to the problem to improve good solutions will be shown. While in the practical part, two
... Show MoreBackground: This study aimed to evaluate the effect of zirconia different surface treatments (primer, sandblast with 50μmAl2O3, Er,Cr:YSGG laser) on shear bond strength between zirconia surface and resin cement. Material and methods: Sixty presintered Y-TZP zirconia cylinder specimens (IPS e.max ZirCAD, Ivoclar vivadent) will be fabricated and sintered in high temperature furnace of (1500 C for 8 hours) according to manufacturer’s instructions to the selected size and shape of (5mm. in diameter and 6mm in height). All specimens were ground flat using 600.800.1000.1200, aluminum oxide abrasive paper to obtain a standardized surface roughness. Surface roughness values were then recorded in µm using surface roughness tester (profi
... Show MoreKE Sharquie, JR Al-Rawi, AA Noaimi, HM Al-Hassany, Journal of drugs in dermatology: JDD, 2012 - Cited by 47
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreAbstract
The aim of the current research is to prepare an integrated learning program based on mathematics standards for the next generation of the NYS and to investigate its impact on the development of the teaching performance of middle school mathematics teachers and the future thinking skills of their students. To achieve the objectives of the research, the researcher prepared a list of mathematics standards for the next generation, which were derived from a list of standards. He also prepared a list of the teaching competencies required for middle school mathematics teachers in light of the list of standards, as well as clarified the foundations of the training program and its objectives and the mathematical
... Show MoreABSTRACT
The study evaluated the effect of adding quercetin to some characteristics of the sperm of the ram. This study was conducted in the animal field, Department of Animal Production, College of Agricultural Engineering Science, University of Baghdad for the period 5/12/2021 to 20/2/2022. In this experiment, 3 rams were used at the age of 2-2.5 years and weighed 50-55 kg. The semen was collected early in the morning and once a week and the semen was pooled to remove the individual differences. The treatments were divided: quercetin-free control group, treatment T1 (3 µL/mL quercetin), T2 treatment (6 µL/mL quercetin), T3 treatment (9 µL/mL quercetin). The result of the study showed
... Show More