Vulnerability Assessment on Ethereum Based Smart Contract Applications
...Show More Authors
With the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch
The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More<span lang="EN-US">The need for robotics systems has become an urgent necessity in various fields, especially in video surveillance and live broadcasting systems. The main goal of this work is to design and implement a rover robotic monitoring system based on raspberry pi 4 model B to control this overall system and display a live video by using a webcam (USB camera) as well as using you only look once algorithm-version five (YOLOv5) to detect, recognize and display objects in real-time. This deep learning algorithm is highly accurate and fast and is implemented by Python, OpenCV, PyTorch codes and the Context Object Detection Task (COCO) 2020 dataset. This robot can move in all directions and in different places especially in
... Show MoreThe drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the
Abstract : A descriptive study was conducted out patient in Neuralgic Hospital and Teaching Baghdad Teaching Hospital from 1st July / 2004 through October 1st / 2004 . in order to assess with QOL for CVA patients , the study aimed to identifying the QOL domain of ( physical , psychological , level of independence , social and environment ) and it relation with some demographic characteristic which is related to those patients .A purposive sample of ( 50 ) CVA patients who selected from out patient clinic of hospitals . A development questionnaire was structured and is adopted of WHO quality of life qu
|
Background: Double diabetes is the term used to describe situations in which a patient exhibits characteristics that are a combination of type 1 and type 2 Diabetes Mellitus. Metalloendopeptidase or Neprilysin is membrane-bound metallopeptidase. It has a wide range of physiological function and a variety of substrates. It has a significant impact on the proteolytic functions of the kidney, cardiovascular health, immunological response, cell proliferation, and fetal development. It also has a preventative effect on the onset of type 2 diabetes, obesity, and cancer. Objective: The study aims to assess the level of MEP in patients wi |
Aim: To evaluate the wettability and microhardness of Zirconium (ZrO2) dental material when coated with different concentrations of Faujasite. Materials and methods: 30 circular disks produced from ZrO2, then each group is classified into 10 control groups, 10 coated groups with 3% Faujasite, and 10 coated groups with 7% faujasite by electro-spun tool to study variable properties in hardness and water contact angle of implant materials. Results: This study stated the high hardness in 7% of faujasite concentration for ZrO2, in addition, the contact angle decreased gradually until reach 0 ᵒ in 7% concentration of faujasite with ZrO2 Conclusion: Water contact angle (WCA) declined till disappeared in (7% wt.) of faujasite coated with the Z
... Show MoreObjectives: To assess the premenstrual syndrome among the working women in Baghdad City.
Methodology: A cross-sectional analytic study, using probability sampling cluster (multi-stage) sampling of
ft°e°*f:£m::?ehL:_ye;roerts:::Ciefdq::d:om|yNfro°v:£°::Cohth°:|o¥dto(3#:th°r3L:Sth2Doa;;WQe::s:j°o[£CateIT:t£T:ufth;::
designed and consisted of (4) parts, including demographic, reproductive, menstrual cycle characteristics, and
premeustmual syndrome symptoms. Content validity and reliability of the questionnaire were detemined by
conducting a pilot study. Descriptive and inferential statistical procedures were used to analyze the data.
Results: The results of the study revealed that the age of women ranged betwee