Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the platform showed its capabilities to register and log users, releasing a lot of information of lost items and automatically forwarding lost-and-found notifications. The paper can be useful for those who deal with the application of information technology.
This study objective is to identify the visual pollution in Karrada district main streets as an example of main streets in Baghdad, the public opinion about each pollutants, solutions to reduce and eliminate the pollution were suggested as well. In order to accomplish this objective different methods were used, 16 pollutants were selected, pictures of each pollutants were taken and a questioner were distributed randomly for 270 people to evaluate the public opinion with statistical methods. Garbage, their disposal and storage areas took the first two places as the highest offensive pollutants. The people showed that they find long lines of vehicles, debris and generators appearance ranked third, fourth and fifth respectively .This resear
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreInfrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show MoreThe accumulation of toxic elements in vegetables and melons grown in agriculture, Brassica rapa - turnip, Solanum lycopersicum - tomato, Citrullus lanatus - watermelon, Capsicum annuum - bell pepper, Daucus carota - carrots, Cucurbita pepo - pumpkin, Cucumis melo - melon, and also Prunus armeniaca - apricot from fruit trees were analyzed. The excess of maximum allowable concentrations in agricultural crops of the element As by 1.65-1.75, Cd - 1.6-2.3, Cr -1.2-2.35, Cu -1.6-3.3, Ni - 1.16-3.53, Pb - 1.54-3.08, Al - 1.36-3.5, Sb - 2.0-33, Se - 1.1-3.3 times was established. The maximum allowable concentration of mercury in vegetables and melons was equal to 0.02 mg/kg,
... Show MoreModern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the
... Show MorePolyaniline membranes of aniline were produced using an electrochemical method in a cell consisting of two poles. The effect of the vaccination was observed on the color of membranes of polyaniline, where analysis as of blue to olive green paints. The sanction of PANI was done by FT-IR and Raman techniques. The crystallinity of the models was studied by X-ray diffraction technique. The different electronic transitions of the PANI were determined by UV-VIS spectroscopy. The electrical conductivity of the manufactured samples was measured by using the four-probe technique at room temperature. Morphological studies have been determined by Atomic force microscopy (AFM). The structural studies have been measured by (SEM).
This paper deals with calculate stresses in Knee-Ankle-Foot-Orthosis as a result of the effect vibration during gait cycle for patient wearing KAFO .Experimental part included measurement interface pressure between KAFO and leg due to action muscles and body weigh on Orthosis. also measurement acceleration result from motion of defected leg by accelerometer .Results of Experimental part used input in theoretical part so as to calculate stresses result from applying pressure and acceleration on KAFO by engineering analysis program ANSYS 14.Resultes show stresses values in upper KAFO greater than lower KAFO that is back to muscles more effective in thigh part lead to recoding pressure higher than pressure in shank part.
Neonatal sepsis refers to the bacterial bloodstream infections of the newborn during the neonatal period as usually the first twenty-eight days of life. The current study was done in the laboratories of AL-Batool Teaching Hospital for Gynecology and Pediatrics in Baqubah, Diyala Governorate, including 140 blood specimens collected from the neonates admitted to the hospital with suspected sepsis, the ages of the both groups was ranged from 1 day to 28 days. Out of the total cultured samples, 32.14% (45 of 140) were positive and 67.86% (95 of 140) were negative blood culture. 45 of 140 samples were negative to the blood culture chosen as control group. The results showed highest isolates were Coagulase Negative Staphylococcus (CoNS) 19 (42.2%
... Show More