E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and capacity in terms of long key space that ensures high resistance possibly obtained by any threat attack, key sensitivity is too high to any slight of change could be made in the encryption key and finally good statistical characteristic's analysis where the software has been used is microsoft visual studio version 10
An Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to
... Show MoreBlogging is about more than just putting thoughts on a web; it's about connecting with and hearing from anyone who read the work. Many web sites now days help to get a free account to quick post thoughts and photos interact with people, and more. The fastest way to understand blogging is to try it out, but in that case securing the blog is important, by including authentication schemes. In this paper we suggest implications of our research for improving the design and usefulness of blogging systems, and also we divided the blogs depending on the subject and need, which are either to be used in public or only used by small group, so we can suggest different steps for securing the blogs.
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficie
... Show Moresensor sampling rate (SSR) may be an effective and crucial field in networked control systems. Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur
... Show MoreWater level and distribution is very essential in almost all life aspects. Natural and artificial lakes represent a large percentage of these water bodies in Iraq. In this research the changes in water levels are observed by calculating the areas of five different lakes in five different regions and two different marshes in two different regions of the country, in a period of 12 years (2001 - 2012), archived remotely sensed images were used to determine surface areas around lakes and marshes in Iraq for the chosen years . Level of the lakes corresponding to satellite determined surface areas were retrieved from remotely sensed data .These data were collected to give explanations on lake level and surface area fluctuations. It is imp
... Show MoreVegetation monitoring is considered an important application in remote sensing task due to variation of vegetation types and their distribution. The vegetation concentration around the Earth is increase in 5% in 2000 according to NASA monitoring. This increase is due to the Indian vegetable programs. In this research, the vegetation monitoring in Baghdad city was done using Normalized Difference Vegetation Index (NDVI) for temporal Landsat satellite images (Landsat 5 TM& Landsat 8 OIL). These images had been used and utilize in different times during the period from 2000, 2010, 2015 & 2017. The outcomes of the study demonstrate that a change in the vegetation Cover (VC) in Baghdad city. (NDVI) generally shows a
... Show MoreIn this paper is to introduce the concept of hyper AT-algebras is a generalization of AT-algebras and study a hyper structure AT-algebra and investigate some of its properties. “Also, hyper AT-subalgebras and hyper AT-ideal of hyper AT-algebras are studied. We study on the fuzzy theory of hyper AT-ideal of hyper AT-algebras hyper AT-algebra”. “We study homomorphism of hyper AT-algebras which are a common generalization of AT-algebras.
The aim of this work is to a connection between two concepts which are an interval value fuzzy set and a hyper AT-algebra. Also, some properties of these concepts are found. The notions of IVF hyper AT-subalgebras, IVF hyper ideals and IVF hyper AT-ideals are defined. Then IVF (weak, strong) hyper ideals and IVF (weak, strong) hyper AT-ideals are discussed. After that, some relations among these ideals are presented and some interesting theorems are proved.
Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.