One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an overview of biometrics systems and approaches in the post-COVID-19 pandemic. The fundamental COVID-19 prevention rules are first reviewed. The relationships between each regulation and the biometrics that may be impacted are then thoroughly investigated. Recommendations for future trends of feasible approaches are provided to assist researchers in advance and enhance the performance of the biometric system for the post-COVID-19 pandemic environment.
In this study, the sonochemical degradation of phenol in water was investigated using two types of ultrasonic wave generators; 20 kHz ultrasonic processor and 40 kHz ultrasonic cleaner bath. Mineralization rates were determined as a function of phenol concentration, contact time, pH, power density, and type of ultrasonic generator. Results revealed that sonochemical degradation of the phenol conversion was enhanced at increased applied power densities and acidic conditions. At 10 mg/L initial concentration of phenol, pH 7, and applied power density of 3000 W/L, the maximum removal efficiency of phenol was 93% using ultrasonic processor at 2h contact time. Whereby, it was 87% using and ultrasonic cleaner bath at 16h contact time and 150 W
... Show MoreI found that it does not meet some of the requirements, including browsing and organizing structural elements, which is something in which the researcher found a scope for research, and from here she can formulate the problem of her research with the following question: Is there an actual need to develop user interface designs in the websites of Iraqi colleges of fine arts? The research included four chapters (the first chapter - the research problem - the second chapter (theoretical framework), which included three sections, the first is to identify the user interface, the second topic is the structural elements, and the third topic includes the rules of interface design and the dimensions of interaction), as well as the third chapter i
... Show MoreIn the present study, the removal of zinc from synthetic waste water using emulsion liquid membrane extraction technique was investigated. Synthetic surfactant solution is used as the emulsifying agent. Diphenylthiocarbazon (ditizone) was used as the extracting agent dissolved in carbon tetrachloride as the organic solvent and sulfuric acid is used as the stripping agent. The parameters that influence the extraction percentage of Zn+2 were studied. These are the ratio of volume of organic solvent to volume of aqueous feed (0.5-4), ratio of volume of surfactant solution to volume of aqueous feed (0.2-1.6), pH of the aqueous feed solution (5-10), mixing intensity (100-1000) rpm, concentration of extracting agent (20-400) ppm, surfactant co
... Show MoreBackground: Quality of life in brain tumor patients is an emerging issue and has prompted neurosurgeons to recon¬sider the need for cognitive assessment in the course of treatment. To date there has been a lack of comprehensive neuropsychological assessment performed preoperatively and in the acute postoperative period in our hospitals.Objectives: to establish the effects of tumors and their surgical treatment, from a neuropsychological perspective, on cognitive functioning in patients with cerebral Gliomas. Methods: This is a prospective study conducted in the Neurosurgical Hospital in Baghdad, Iraq, during the period from January 1999 to January 2001. Any patient admitted during the period of the study with clinical history, signs, sy
... Show MoreIn this study, the flow and heat transfer characteristics of Al2O3-water nanofluids for a range of the Reynolds number of 3000, 4500, 6000 and 7500 with a range of volume concentration of 1%, 2%, 3% and 4% are studied numerically. The test rig consists of cold liquid loop, hot liquid loop and the test section which is counter flow double pipe heat exchanger with 1m length. The inner tube is made of smooth copper with diameter of 15mm. The outer tube is made of smooth copper with diameter of 50mm. The hot liquid flows through the outer tube and the cold liquid (or nanofluid) flow through the inner tube. The boundary condition of this study is thermally insulated the outer wall with uniform velocity a
... Show MoreEffective decision-making process is the basis for successfully solving any engineering problem. Many decisions taken in the construction projects differ in their nature due to the complex nature of the construction projects. One of the most crucial decisions that might result in numerous issues over the course of a construction project is the selection of the contractor. This study aims to use the ordinal priority approach (OPA) for the contractor selection process in the construction industry. The proposed model involves two computer programs; the first of these will be used to evaluate the decision-makers/experts in the construction projects, while the second will be used to formul
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More