Nowadays, due to our everyday stress and current stressful lifestyle, the loss of items appears a frequent issue and may be very inconvenient. In this regard, until the IoT becomes part of everyday life, we can use the software as an efficient tool to assist a person's searching, verifying, and finding lost belongings. This paper presents an Android-based application that we proposed and implemented to help users find lost items. Utilizing this software will enable the subscriber to record his request to the relevant authority. In addition, a special section offers to insert a contact telephone number or email to communicate between the person who found the item and the person who lost it. During testing, among other services, the platform showed its capabilities to register and log users, releasing a lot of information of lost items and automatically forwarding lost-and-found notifications. The paper can be useful for those who deal with the application of information technology.
A variety of liquid crystals comprising heterocyclics 1,3,4-oxadiazol ring [III], aminooxazol [IV]a, and aminothiazol [IV]b were synthesized through a number of steps, beginning of the reaction of 3, 3'- dimethyl - [1, 1'-biphenyl] -4, 4'- diamin, ethyl monochloroacetate and sodium acetate to synthesize diacetate compound[I]. The diester reacted with hydrazine hydrate(N2H4-H2O) to give dihydrazide compound [II], then reacted with Pyruvic acid and phosphorous oxychloride to produce diketone compound [III]. The last compound was reacted with urea and thiourea to give aminooxazol and aminothiazol respectively. The synthesized compounds actually characterized and determined the structures by melting points, FT-IR and 1H-NMR spectroscopies. By u
... Show MoreIntestinal mucositis is referring to inflammatory or ulcerative lesions of the oral or gastrointestinal tract; one of the main reasons is treatment with cancer chemotherapy. The prodrug Irinotecan is converted by carboxylesterase to the active metabolite SN-38, conjugated by UGT enzyme to SN-38G and then deconjugated by ?-glucoronidase produced by intestinal bacterial flora to produce SN-38. Irinotecan induces intestinal mucositis and diarrhea due to increased concentration of its active metabolite (SN-38).To evaluate the protective effect of carvone, I.P injection of (75mg/kg/day) of irinotecan for 4 days to induce intestinal mucositis, carvone administered to mice orally for 6 days starting from day 1. Results showed that carvone (50mg
... Show MoreThe research problem stems from the suffering of organizations from the weakness of their organizing aspect and the weak influence of the leadership on the subordinates and their dispersion. Organizations today are in rapid development and therefore work relations are not dominated by the humanitarian aspect and the first goal has become productivity. The research aims to identify the influence of servant leadership and its dimensions as an independent variable on the effectiveness of work teams as an approved variable and their importance increases when these organizations are service organizations, and how their influence increases when this leadership is the servant leadership and its dimensions in the Health Depa
... Show MoreThe ritual is a Sunnah between the two prostrations, not as some of the worshipers do, where he made it in the last tashahhud when the tasleematin, and it may be in the last tashahhud.
The assumption is Sunnah and most of the scholars say that in the middle tashahhud session as we have shown through research.
The Turks are Sunnah as well, and it is at the end of the prayer, whether it is double, triple or quadruple, whether it is naval or NAFTA, whether it is urban or travel, which is the view of most scholars from the three imams and others.
If we say weighting, say the audience of the three imams (Malik, Shafi'i, and Ahmad) is the most correct, and it is also the son of values, and if we say the choice is as Ibn Rushd said: by
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root gives invertible model and when the sign is negative means the root gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when
Experimental and numerical investigations of the centrifugal pump performance at non-cavitating and cavitating flow conditions were carried out in the present study. Experiments were performed by applying a vacuum to a closed-loop system to investigate the effects of the net positive suction head available (NPSHa), flow rate, water temperature and pump speed on the centrifugal pump performance. Accordingly, many of the important parameters concerning cavitation phenomenon were calculated. Also, the noise which is accompanied by cavitation was measured. Numerical analysis was implemented for two phase flow (the water and its vapor) using a 2-D simulation by ANSYS FLUENT software to investigate the internal flow of centrifugal pump under c
... Show MoreThe search for wealth and money is a matter of ethics in the Islamic economy
God Almighty said: "We have honored the sons of Adam (and ridiculed the universe and what he said) mocked you
He said, "He who created you from the earth."
And he commanded you, and he said to him, "He who made you."
Land, and the amount of Rezko and
He said: "You love the money with great love."
And then guide him by exaggerating the ethics of Islam and its legislation in Tamkak and not exceeding it.
In order to darken the doors of inflation with wealth Vakar
And the hereafter and achieve satisfaction and fairness in all actions
To ensure that society has a right not to harm others and to abuse the interests of the economy
Is
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More