The aim of advancements in technologies is to increase scientific development and get the overall human satisfaction and comfortability. One of the active research area in recent years that addresses the above mentioned issues, is the integration of radio frequency identification (RFID) technology into network-based systems. Even though, RFID is considered as a promising technology, it has some bleeding points. This paper identifies seven intertwined deficiencies, namely: remote setting, scalability, power saving, remote and concurrent tracking, reusability, automation, and continuity in work. This paper proposes the construction of a general purpose infrastructure for RFID-based applications (IRFID) to tackle these deficiencies. Finally, the proposed IRFID is compared against
eight existing systems. As a result, IRFID can be considered as a prototype for the futuristic with flexibility and generality in a wide-range of automation and development areas.
Media studies have focused mostly on the issue of the mental image because the image that is formed in the mind has become not only a photo of a human being and having kept for himself. This image has an outside influence which may sometimes up to the formation of the fate of others and it sometimes includes individuals and groups together.
This study comes in the context of identifying the image of Iraqi political parties among Iraqi university students and the nature of the view that students have in their minds about these parties.
Chapter one includes the problem of the research, the importance of the study, the goals and method used. Chapter two is divided into two sections: section one deals with the concept of the mental i
In this paper, we have generalized the concept of one dimensional Emad - Falih integral transform into two dimensional, namely, a double Emad - Falih integral transform. Further, some main properties and theorems related to the double Emad - Falih transform are established. To show the proposed transform's efficiency, high accuracy, and applicability, we have implemented the new integral transform for solving partial differential equations. Many researchers have used double integral transformations in solving partial differential equations and their applications. One of the most important uses of double integral transformations is how to solve partial differential equations and turning them into simple algebraic ones. The most important
... Show MoreThe photo-electrochemical etching (PECE) method has been utilized to create pSi samples on n-type silicon wafers (Si). Using the etching time 12 and 22 min while maintaining the other parameters 10 mA/cm2 current density and HF acid at 75% concentration.. The capacitance and resistance variation were studied as the temperature increased and decreased for prepared samples at frequencies 10 and 20 kHz. Using scanning electron microscopy (SEM), the bore width, depth, and porosity % were validated. The formation of porous silicon was confirmed by x-ray diffraction (XRD) patterns, the crystal size was decreased, and photoluminescence (PL) spectra revealed that the emission peaks were centered at 2q of 28.5619° and 28.7644° for et
... Show MoreA critical milestone in nano-biotechnology is establishing reliable and ecological friendly methods for fabricating metal oxide NPs. Because of their great biodegradable, electrical, mechanical, and optical qualities, zirconia NPs (ZrO2NPs) attract much interest among all zirconia NPs (ZrO2NPs). Zirconium oxide (ZrO2) has piqued the interest of researchers throughout the world, particularly since the development of methods for the manufacture of nano-sized particles. An extensive study into the creation of nanoparticles utilizing various synthetic techniques and their potential uses has been stimulated by their high luminous efficiency, wide bandgap, and high exciton binding energy. Zirconium dioxide nano
... Show MoreIn this research, cyclic compounds derived from 2- furfural mercaptan (oxazole, triazoles) were synthesized, and their biological efficacy was measured and compared with standard drugs. Also, their effectiveness as anti-oxidant was measured and compared with ascorbic acid as a standard substance. Some of the synthesized compounds were deduced with good efficacy. © 2021 Sami Publishing Company. All rights reserved
The aim of the research is to know the level of time management application and its impact on the performance of the job, a survey search in the general company for communication and information technology and provide recommendations that help employees to optimize the use of time and improve performance, which is an important element in controlling the various functions of the company. In order to achieve the objectives of the research, the questionnaire was based on two main variables and distributed to a random sample of (44) employees in the company out of (308) employees, thus the proportion of the sample (14%). After collecting the samples from the sample, there are (6) incomplete forms that have been retri
... Show MoreProducts’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.
 
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More