As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.
This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC
... Show MoreThis study deals with the seismic reflection interpretation of lower Cretaceous Formations in Dhufria area, including structural and stratigraphic techniques. In the interpretation process, the 3-D seismic data volume and well logs have been used. Based on well logs and synthetic traces two horizons were identified and picked which are the top and bottom of Zubair Formation. These horizons were followed over all the area in order to obtain structural setting as well as studying Kirkuk group Formation of Tertiary age which represents highstand progradational seismic facies.
This paper study two stratified quantile regression models of the marginal and the conditional varieties. We estimate the quantile functions of these models by using two nonparametric methods of smoothing spline (B-spline) and kernel regression (Nadaraya-Watson). The estimates can be obtained by solve nonparametric quantile regression problem which means minimizing the quantile regression objective functions and using the approach of varying coefficient models. The main goal is discussing the comparison between the estimators of the two nonparametric methods and adopting the best one between them
Progression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon
... Show MoreLeishmaniasis diseases constitute an important public health problem in both tropical and subtropical areas. The aim of this study is to evaluate the epidemiological situation of cutaneous leishmaniasis (CL) in Babylon province, Iraq. The current work included the recording of 142 new cases of CL infection in Babylon province for the period from November 2019 to February 2020. Male infection was represented by 87 cases (61.27%), while females composed 55 samples (38.73%), with a significant difference (p<0.05) between the two groups. The age group of 5-14 years was found to have the highest recorded CL cases (56; 39.44%), while the age group of less than one year had the lowest cases (1; 0.70%), with the differences
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show MoreBackground: Esthetic correction represents one of the clinical conditions that required the use of laminate veneers in premolars region. Aim of the study: The purpose of this study was to evaluate the fracture strength of the laminate veneers in maxillary first premolars, fabricated from either composite (direct and indirect techniques) or ceramic CAD/CAM blocks. Materials and Methods: Fifty sound human maxillary premolar teeth were used in this in vitro study. Teeth were divided randomly into one control group and four experimental groups of ten teeth each; Group A: Restored with direct composite veneer (Filtek Z250 XT), Group B: Restored with indirect composite veneers (Filtek Z250 XT), Group C: Restored with lithium disilicate ceramic CA
... Show MoreElectrical resistivity methods are one of the powerful methods for the detection and evaluation of shallower geophysical properties. This method was carried out at Hit area, western Iraq, in two stages; the first stage involved the use of 1Dimensional Vertical Electrical Sounding (VES) technique in three stations using Schlumberger array with maximum current electrodes of 50m. The second stage included the employment of two dimension (2D) resistivity imaging technique using dipole-dipole array with a-spacing of 4m and n-factor of 6 in two stations. The 1D survey showed good results in delineating contaminated and clear zones that have high resistivity contrast. Near the main contaminated spring, the 2D resi
... Show More