In this article, the solvability of some proposal types of the multi-fractional integro-partial differential system has been discussed in details by using the concept of abstract Cauchy problem and certain semigroup operators and some necessary and sufficient conditions.
this paper presents a novel method for solving nonlinear optimal conrol problems of regular type via its equivalent two points boundary value problems using the non-classical
Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show MoreThe current study was conducted to demonstrate the effects of air pollution on different biochemical parameters inCitrus aurantium plant and calculation the Air Pollution Tolerance Index (APTI). Five sites were selected tocollect plant leaves, four of them within the city of Baghdad, namely Al-Jadriya, Al-Andlous, Al-Doura and closeto the private generators to represent the urban areas and Abu Ghraib site to represent the rural area. Seasonalsamples were collected for the period from October 2016 to June 2017. Eleven biochemical parameters totalchlorophyll, ascorbic acid, leaf extract pH, relative water content, total nitrogen, total protein content, total sugarcontent, proline, electrical conductivity, cadmium and lead. The results of Citr
... Show MoreIn this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More