Towards Space Sensor Network and Internet of Things: Merging CubeSats with IoT
...Show More Authors
Studying the past for its importance and connection with the present is reflected in a relative scale in the light of data and thought of the predecessors of a great nation like the Mesopotamia, where its civilization flourished and rose since the ancient times, which inspires the present with inherited meanings that might be an entity or recognized symbols in the establishment of a vision, system or architectural building. The researcher has crystallized the description of the past to enhance the vision of the present within what is required by the interior design specialty about the historical origins of education and the design of schools in the Mesopotamia, in addition to its ethnic and environmental specificity and the moral content
... Show MoreNA Nasir, H Amir, Faculty of medicine - Iraq, 2017 - Cited by 13
Abstract:
Objectives: To assess nurses' attitude toward end of life phase. To find out relationships between nurses attitude and socio demographic data (age, gender, level of education, years of experience).
Methodology: A descriptive cross-sectional study design is carried out to assess the attitude on nurses concerning patient at the end of life phase at critical care units, from the period of (1nd November 2021) to (1th February 2022). A probability sample random sampling technique used. Then, the number of participants in Baquba Teaching Hospital and general al khalis hospital were determined by using rando
... Show MoreIran Regional and Foreign Security Policies Gulf. The long history of regional and other conflicts which their severity increased because of appearance of modern states and cultural and lingual ancient differences resulted in deep feeling of doubt and suspicion between Iran and its Arab neighbors .Meanwhile the two sides have several interests common points , the moist important is the strategic and commercial interests . The fears and objective procedures based on the continuing evaluation of Iran abilities and needs direct security policies in internal and foreign affairs concerning the world in Gulf specially.
The research entitled "the attitudes of Iraqi People towards the Logic Propaganda for Terrorist Organization such as Daash Regulation, as-Qaida, and Jabhat al-Nasra". It is a field study on the professors and the students of the College of Mass Media at Baghdad University in 2014.
After the global war on terrorism declared on September 11, 2011, the researcher finds it is important to study such subject as it threats the unity and sovereignty of Iraq especially after th
... Show MoreIn this paper, integrated quantum neural network (QNN), which is a class of feedforward
neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreThis paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreDue to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro
... Show More