As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.
Background: The marginal seal is essential for sealant success because penetration of bacteria under the sealant might allow caries onset or progression. The aim of the present study was to estimate and compare the microleakage of pit and fissure sealant after various methods of occlusal surface preparation. Materials and methods: Thirty non-carious premolars extracted for orthodontic reasons were equally divided into three groups. In group one, occlusal fissures were opened with round carbide bur, in group two, occlusal surfaces of the teeth were cleaned with a dry pointed bristle brush and samples of group three were cleaned with a slurry of fine flour of pumice in water using rubber cup. Then fissures of all teeth were etched using 35% p
... Show MoreThe aim of this paper, is to design multilayer Feed Forward Neural Network(FFNN)to find the approximate solution of the second order linear Volterraintegro-differential equations with boundary conditions. The designer utilized to reduce the computation of solution, computationally attractive, and the applications are demonstrated through illustrative examples.
In this paper, new integro-differential operators are introduced that defined by Salagean’s differential operator. The major object of the present study is to investigate convexity properties on new geometric subclasses included these new operators.
Understanding breaking news necessitates a special attention, since they are written with a special style. The study aims at identifying the difficulties faced by the Iraqi university EFL learners in comprehending English breaking news. The study included 10 fourth year students enrolled at the Department of English, College of Education for Humanities, University of Anbar. Thus, a questionnaire as a research instrument, was sent online to the students. The questionnaire points were related to the identification of difficulties faced by the learners in comprehending English breaking news. The data of the study were (10) headlines selected purposively from Euronews website. The data were qualitatively analyzed based on quantifying the qua
... Show MoreIncorporating the LiDAR sensor in the most recent Apple devices represents a substantial development in 3D mapping technology. Meanwhile, Apple's Lidar is still a new sensor. Therefore, this article reviews the potential uses of the Apple Lidar sensor in various fields, including engineering and construction, focusing on indoor and outdoor as-built 3D mapping and cultural heritage conservation. The affordable cost and shorter observation times compared to traditional surveying and other remote sensing techniques make the Apple Lidar an attractive choice among scholars and professionals. This article highlights the need for continued research on the Apple LiDAR sensor technology while discussing its specifications and limitations. A
... Show MoreThe paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreMore than 95% of the industrial controllers in use today are PID or modified PID controllers. However, the PID is manually tuning to be responsive so that the Process Variable is rapidly and steady moved to track the set point with minimize overshoot and stable output. The paper presents generic teal-time PID controller architecture. The developed architecture is based on the adaption of each of the three controller parameters (PID) to be self- learning using individual least mean square algorithm (LMS). The adaptive PID is verified and compared with the classical PID. The rapid realization of the adaptive PID architecture allows the readily fabrication into a hardware version either ASIC or reconfigurable.
Psychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from
... Show More