As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.
Background: Hyperthyroidism is a serious public concern, due the continuous increase in its prevalence and its impact on the mortality rates. Autoimmune hyperthyroidism is seen as a thyroid gland problem. Pro-inflammatory cytokines are crucial for the growth and development of hyperthyroidism, it was shown that the level of several pro-inflammatory cytokines were higher in the hyperthyroidism patients. Objective: This work was aimed to assessment the concentration of certain cytokine in hyperthyroid patients. Materials and Methods: Sixty hyperthyroidism patients and 30 healthy individuals with age range from (30-65) years old were enrolled in this study through their presence at the National Center for Diabetes Treatment and Research in Bag
... Show MoreIn this research The study of Multi-level model (partial pooling model) we consider The partial pooling model which is one Multi-level models and one of the Most important models and extensive use and application in the analysis of the data .This Model characterized by the fact that the treatments take hierarchical or structural Form, in this partial pooling models, Full Maximum likelihood FML was used to estimated parameters of partial pooling models (fixed and random ), comparison between the preference of these Models, The application was on the Suspended Dust data in Iraq, The data were for four and a half years .Eight stations were selected randomly among the stations in Iraq. We use Akaik′s Informa
... Show MoreLeishmaniasis is a global illness that is endemic in many countries, including Iraq. The characteristic of cutaneous leishmaniasis (CL) is the development of skin ulcers that are controlled by the immune system. Tumor necrosis factor-alpha (TNF-α), a cytokine generated by the innate immune response to CL infection, can influence disease clearance in the human host. The effect of this pro-inflammatory cytokine in CL ulcer development during the infection is not well established. In this study TNF-α level was detected in the patients who suffered from cutaneous leishmaniasis. This level was also assessed in the newly diagnosed patients and others who were undergoing different stages of pentostam treatment. Notably the result
... Show MoreAn evaluation of pollution level has been done for drinking water which is used in Kirkuk city by heavy metals ( As,Cd,Cu,Fe,Mn,Ni,Zn,Cr,Pb) samples were collected during wet and dry of 2016-2017 from Kirkuk unified water supplied project (WTP) which is supply the city with drinking water, as well as from water of tanks type (GST2), and also from (tap water) (Zone3). The results showed the concentration of the (As,Cd,Cu,Fe,Mn,Ni,Zn,Cr,Pb)inppbfor (WTP)are (0.5,0.6,6.45,38,4.6,2.5,6537,0.58,1.4) (0.6,0.8,6.76,46,5.5,3.5,6675,1,2.4) for (GST) (0.5,0.63,6.46,52.3,4.4,3.6,6550,0.6,2.5) (0.60,0.7,6.78,63.7,6.7,3.7,6680,1.1,2.6) and for tap water are (0.53,0.65,7.00,60.2,4.4,3.65,7200,0.8,2.7) (0.60, 0.71, 7.10, 67.6, 6.8,3.75,7320,0.9,2.75) f
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
A modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
Objectives: Small field of view gamma detection and imaging technologies for monitoring in vivo tracer uptake are rapidly expanding and being introduced for bed-side imaging and image guided surgical procedures. The Hybrid Gamma Camera (HGC) has been developed to enhance the localization of targeted radiopharmaceuticals during surgical procedures; for example in sentinel lymph node (SLN) biopsies and for bed-side imaging in procedures such as lacrimal drainage imaging and thyroid scanning. In this study, a prototype anthropomorphic head and neck phantom has been designed, constructed, and evaluated using representative modelled medical scenarios to study the capability of the HGC to detect SLNs and image small organs. Methods: An anthropom
... Show More