E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10
A mixture model is used to model data that come from more than one component. In recent years, it became an effective tool in drawing inferences about the complex data that we might come across in real life. Moreover, it can represent a tremendous confirmatory tool in classification observations based on similarities amongst them. In this paper, several mixture regression-based methods were conducted under the assumption that the data come from a finite number of components. A comparison of these methods has been made according to their results in estimating component parameters. Also, observation membership has been inferred and assessed for these methods. The results showed that the flexible mixture model outperformed the others
... Show MoreA mixture model is used to model data that come from more than one component. In recent years, it became an effective tool in drawing inferences about the complex data that we might come across in real life. Moreover, it can represent a tremendous confirmatory tool in classification observations based on similarities amongst them. In this paper, several mixture regression-based methods were conducted under the assumption that the data come from a finite number of components. A comparison of these methods has been made according to their results in estimating component parameters. Also, observation membership has been inferred and assessed for these methods. The results showed that the flexible mixture model outperformed the
... Show MoreAbstract
This research’s goal is to restore and to revive the jurisprudence of Mother of Believers (Um alMuaamineen) “Um Salmah” "may God bless her", and to highlight her outstanding assimilation and understanding of religion and her conscious thought. The current research is a comparative scientific theoretical study represented in the comparison of jurisprudence of “Um Salamah” with Hadiths of fasting and pilgrimage rules as well as the duration mentioned in jurisprudence of for doctrines( 4 schools of thought )to identify these hadiths with the inclusion and discussion of their evidence.
The current research included two topics: the first one is to identify and introduce
... Show MoreSteganography involves concealing information by embedding data within cover media and it can be categorized into two main domains: spatial and frequency. This paper presents two distinct methods. The first is operating in the spatial domain which utilizes the least significant bits (LSBs) to conceal a secret message. The second method is the functioning in the frequency domain which hides the secret message within the LSBs of the middle-frequency band of the discrete cosine transform (DCT) coefficients. These methods enhance obfuscation by utilizing two layers of randomness: random pixel embedding and random bit embedding within each pixel. Unlike other available methods that embed data in sequential order with a fixed amount.
... Show MoreSynthesis of sedimentologic, paleocurrent, and organic geochemistry data of the Lower Permian Ga’ara Formation from the Western Desert, western Iraq, shows good hydrocarbon potentiality and deposition by high sinuosity and mixed-load channels, likely by a meandering river system. The Ga’ara Formation includes kaolinitic mudstone beds of various colors and channelized quartzitic sandstone beds. Based on the lithofacies identification, five lithofacies associations have been recognized: channel-floor, point-bar, abandoned channel plug, crevasse splay, and interchannel flood basin. In addition, the paleocurrent analysis and sandstone percentage map indicate a variation of the paleoflow spatially and temporally with a general di
... Show MoreThe current study primarily aims to develop a dictionary system for tracing mobile phone numbers for call centers of mobile communication companies. This system tries to save the numbers using a digital search tree in order to make the processes of searching and retrieving customers’ information easier and faster. Several shrubs that represent digits of the total phone numbers will be built through following the phone number digits to be added to the dictionary, with the owner name being at the last node in the tree. Thus, by such searching process, every phone number can be tracked digit-by-digit according to a required path inside its tree, until reaching the leaf. Then, the value stored in the node, that rep
... Show MoreThe aims of the paper are to present a modified symmetric fuzzy approach to find the best workable compromise solution for quadratic fractional programming problems (QFPP) with fuzzy crisp in both the objective functions and the constraints. We introduced a modified symmetric fuzzy by proposing a procedure, that starts first by converting the quadratic fractional programming problems that exist in the objective functions to crisp numbers and then converts the linear function that exists in the constraints to crisp numbers. After that, we applied the fuzzy approach to determine the optimal solution for our quadratic fractional programming problem which is supported theoretically and practically. The computer application for the algo
... Show MoreThe rising prevalence of obesity-related glomerulopathy (ORG) occurs in accordance with the rising prevalence of obesity worldwide. Clinically ORG is manifested by slowly progressing microalbuminuria that may develop to clinically evident proteinuria. Pathological characteristics of ORG include glomerular hypertrophy in the presence or absence of focal segmental glomerulosclerosis (FSGS). ORG can develop into clinically overt chronic renal insufficiency or even end-stage kidney disease. This article reviews the most important mechanisms for the development of ORG; that are abnormal renal hemodynamics, stimulation of renin-angiotensin-aldosterone system (RAAS), impairment of insulin sensetivity, ectopic lipid deposition, adipose tissue cy
... Show MoreResearch in the field of biometric simulation is in the design of various and various industrial products, but it still needs new studies and research that are compatible with scientific and technological development, especially in the field of computing. Recognition, deduction, and simulation of nature, for example, the use of animal bones as tools in cutting, hunting or fighting, in addition to the use of animal drawings in cave drawings as symbols of strength, as well as dance movements and face painting to simulate the natural reality that surrounds humans. This trend developed to include simulation of nature in the formal and functional aspect to reach To vocabulary and solutions that help man in his daily life, the research probl
... Show MoreIn order to increase the amount of solar radiation reaching a solar panel, and hence increase its performance, a tracking system might be used. A prototype of an efficient and portable solar tracking system, for home applications was constructed. The Arduino Uno Microcontroller is utilized to drive the proposed tacking system. The results of area under curve show that at certain circumstances, the open-loop tracking system is more efficient as compared with fixed one, while the closed-loop tracker is slightly efficient than open-loop tracker.