E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10
The spectrum known represented as a relationship that’s plotted between the magnitudes or energy for a specific parameter vs. its frequency, the wind spectrum is presented as the sum of wind speed created by events divided either in space, in time, or both. This paper presents a wind speed spectrum demonstration in
Ali Al-Gharbi location in Iraq. The aim of the present paper is to analysis the wind speed and direction by employing the FFT (Fast Fourier Transform) therefore field measurement of wind speed and direction were collected for one year from Dec 2014 to Dec 2015 in the time interval of 10 minutes at heights of 10, 30 and 50
meters. From the performance of the FFT it was found that the v
The research location is the northern part of the Basin of Limboto Lake; the focus of the research is the limestone outcrop with 24 meter thickness in Yosonegoro area. The purpose of the study is to find out facies, standard microfacies and depositional environment on Limboto limestone. The research method carried out consisted of three methods namely the measured section, petrographic analysis and biostratigraphy analysis.
The limestone facies in the Yosonegoro area consist of two facies. Then, based on sedimentary structure, composition, color, precipitation texture, terrestrial origin components and the organism content, the two facies can divided into three different microfacies. Paleobathyme
... Show MoreTen soil samples were collected from Ishaqi project area, Salah Al-Dean Governorate, and analysed for chemical elements (Fe2O3, Al2O3, CaO, K2O Na2O, Co, Zn, Cu, and Pb) to detect the pollution in the study soil using the indices of geo-accumulation (I-geo), contamination factor (CF), and pollution load index (PLI), The results of I-geo indicate that the soil of Ishaqi project area is unpolluted with Pb, Co and slightly polluted with Zn and Cu. The results of CF for Zn, Cu, and Co showed class 2 of moderate contamination and class 1 of low contamination in some samples while those for Pb demonstrated class 1 –of low contamination. The Pollution Load Index (PLI) values for Co, Zn, Cu, and Pb showed cla
... Show MoreBackground: This study was conducted to evaluate the hard palate bone density and thickness during 3rd and 4th decades and their relationships with body mass index (BMI) and compositions, to allow more accurate mini-implant placement. Materials and method: Computed tomographic (CT) images were obtained for 60 patients (30 males and 30 females) with age range 20-39 years. The hard palate bone density and thickness were measured at 20 sites at the intersection of five anterioposterior and four mediolateral reference lines with 6 and 3 mm intervals from incisive foramen and mid-palatal suture respectively. Diagnostic scale operates according to the bioelectric impedance analysis principle was used to measure body weight; percentages of body fa
... Show MoreA seismic study was conducted to re-interpret the Qasab and Jawan oil field in northern Iraq, south of the city of Mosul, by reprocessing and interpreting many seismic sections of a number of field surveys that included the field area. Two reflectors are detected, represented by Hartha Formations which were deposited during the Cretaceous age and Euphrates Formation which was deposited during the Tertiary age in order to stabilize the structural image of this field. The study was achieved by reinterpreting seismic sections using the Petrel program, where time, velocity and depth maps were prepared for the two formations.
The study showed that the Qasab and Jawan fields generally consist of a s
... Show MoreThis paper addresses the nature of Spatial Data Infrastructure (SDI), considered as one of the most important concepts to ensure effective functioning in a modern society. It comprises a set of continually developing methods and procedures providing the geospatial base supporting a country’s governmental, environmental, economic, and social activities. In general, the SDI framework consists of the integration of various elements including standards, policies, networks, data, and end users and application areas. The transformation of previously paper-based map data into a digital format, the emergence of GIS, and the Internet and a host of online applications (e.g., environmental impact analysis, navigation, applications of VGI dat
... Show MoreMunicipal solid waste generation, management, and dumping are economic and ecological concerns that metropolitan areas, particularly those in developing nations, must address. This study intended to ascertain the impacts of solid waste on the quality of groundwater around trash dumps located inside and surrounding landfill sites in the city of Erbil. Samples of groundwater, as well as two samples of leachate, were collected from eight wells situated near landfills during the dry and rainy seasons of August 2021 and February 2022. Several physico-chemical parameters, including pH, EC, NO2, NO3, alkalinity, HCO3, Na, Ca, Mg, Cl, SAR, total hardness, and heavy metals, were evaluated in the samples.
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreDue to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To
... Show More