The present study took up the different ways to cultivate the species Epipremnum aureum by two habitat water and soil and comber the anatomical features of the root, stem, and leaf. The results showed amazing significant anatomical features to the ecosystem. The root and stem anatomy showing decrease in all characters that studied but the leaf anatomy showing increase of palisade, spongy tissue thickness, midrib thickness, number of vessels in the xylem also the long and width of stomata of the soilless plants than soil ones. The upper epidermis empty from the stomata for the two treatment and the stoma diffuse in the lower epidermis, the type of it paracytic type. Also the total of flavonoids in the plant that were growth in soil reached 140.489 ml/kg and in the water 140.385 ml/kg
The environment contemporary works for the insurance companies have seen a number of technological developments and changes rapidly in light of the intense competition in the insurance market, and this affects human behavior in the workplace, and to director in his work needs to be a set of managerial skills. so we find compensation activity in companies insurance needs a high managerial skills, so that compensation, director of the settlement procedure successfully. So research aims to test two hypotheses two major belongings variables search using some statistical methods to extract the results and interpretation and analysis (such as arithmetic mean, standard deviation, percentages, Alpha Cronbach's coefficient, Pearson correlation co
... Show MoreBackground: There is a significant molecular response to imatinib given at standard doses in individuals with chronic myeloid leukemia (CML) whose ABCB1 polymorphisms are present. Objective: To investigate the impact of the polymorphism in the ABCB1 gene rs1128503 on the effectiveness of nilotinib or imatinib therapy. Methods: From May 2022 until the end of January 2023, the current study was carried out in a single research institution, the National Center of Hematology, Baghdad Teaching Hospital at Medical City, Iraq. 76 people with chronic phase myeloid leukemia (CML-CP), who had previously received a diagnosis using the European Leukemia Net (ELN) criteria, enrolled in the trial. The PCR product was delivered to Macrogen Corpora
... Show MoreIn this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More