As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.
Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ
... Show MoreOne of the challenging and active research topics in the recent years is Facial Expression. This paper presents the method to extract the features from the facial expressions from still images. Feature extraction is very important for classification and recognition process. This paper involve three stages which contain capture the images, pre-processing and feature extractions. This method is very efficient in feature extraction by applying haar wavelet and Karhunen-Loève Transform (KL-T). The database used in this research is from Cohen-Kanade which used six expressions of anger, sadness fear, happiness, disgust and surprise. Features that have been extracted from the image of facial expressions were used as inputs to the neural networ
... Show MoreFructophilic lactic acid bacteria (FLAB) isolated from honeybee’s nectar stomach represent an important source of antimicrobial substances that has been focused on nowadays. In this study, these FLABs were tested for their antibacterial activity in vivo as well as the detection of Interleukine -17 in the serum of rabbits ingested with FLAB isolates. Fructobacillus fructosus FH1, Fructobacillus fructosus FH8 and Lactobacillus kunkeei SHGH-7 FLAB isolates were used against wound infections caused by Pseudomonas aeruginosa and Staphylococcus aureus (MRSA) in rabbit skin . Enzyme linked sorbent immunoassay (ELISA) was used to detect the levels of Interleukine-17 in the sera of rabb
... Show MoreBackground: Diabetic mellitus (DM) is a collection of metabolic disorder identified by hyperglycemia. The heterogeneous etiology includes defects either in insulin secretion, or in insulin action, or the both. In addition to the distraction in carbohydrate, fat and protein metabolism. Inflammatory reaction that caused by many pro-inflammatory cytokines play a central role in the pathogenicity of T2DM, these cytokines can enhance insulin resistance which led to impaired glucose homeostasis. Subjects: The study included 75 patients (38 males and 37 females) suffering from T2DM with age mean ± SE 52.30 ± 1.60, and 70 individuals as healthy controls (35 males and 35 females) with age mean ± SE 48.88 ± 0.64. Evaluation of immunological marke
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreThis text and guide discusses the surgical and medical management of congenital heart diseases in both adult and children. It describes the disease, pathology, treatment, complications and follow-up with extensive use of didactic material to educate the reader to the practicalities of the subject. It details the novel research via an extensive literature review, while covering all aspects of the surgical and medical treatment of congenital heart disease. It includes review of the laparoscopic techniques and epidemiology of each disease involved and their prevalence to provide the reader with the full clinical picture. Clinical and Surgical Aspects of Congenital Heart Diseases: Text and Study Guide provides a thorough practical reference fo
... Show MoreIn recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreIn this paper, the oscillation of a Hematopoiesis model in both cases delay and non-delay are discussed. The place and are continuous pstive -rdic functions. In the nn-dlay cse, we will exhibit that a nonlinear differential equation of hematopoiesis model has a global attractor for all different pstive solutions. Also, in the delay case, the sufficient conditions for the oscillation of all pstive solutions of it aboutare presented and we establish sufficient cnditions for the global attractive of. To illustrate the obtained results some examples are given.