IT has its impact on all aspects of life, including its planning and operations. Based on the assumption that the plan can adapt any technique as an analytical tool within broader dimensions to include society in general and meet the requirements of that society. They have neutral values, meaning and usefulness rather than being adopted as abstract goals or objectives so that the planner or the decision-maker can benefit greatly from them. This information technology is summarized in three main axes: First: Geographic Information Systems. Second: computer modeling. Third: visual simulation and the Internet. The problem of research is that the decision-making environment of the plan is surrounded by uncertain information-planning conditions due to the size of the variables affecting it and the lack of integration of the database and its connection to the models of solving the planning problems. This has resulted in poor control capacity to save, process and derive indicators from the amount of data available. The objective of the technique is to provide logical linking of the databases with the planning models to facilitate the decision making of information management of the events in the city and remove the uncertainty conditions of the decision-maker's environment and reach a clear vision to understand the problem and make the right decision to solve it. On the assumption that the decision does not give the regimes the decision-making power.
The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreToday, the prediction system and survival rate became an important request. A previous paper constructed a scoring system to predict breast cancer mortality at 5 to 10 years by using age, personal history of breast cancer, grade, TNM stage and multicentricity as prognostic factors in Spain population. This paper highlights the improvement of survival prediction by using fuzzy logic, through upgrading the scoring system to make it more accurate and efficient in cases of unknown factors, age groups, and in the way of how to calculate the final score. By using Matlab as a simulator, the result shows a wide variation in the possibility of values for calculating the risk percentage instead of only 16. Additionally, the accuracy will be calculate
... Show MoreIn the present study, MCM-41 was synthesis as a carrier for poorly drugs soluble in water, by the sol-gel technique. Textural and chemical characterizations of MCM-41 were carried out by X-ray diffraction (XRD), Fourier transform infrared (FTIR), scanning electron microscope (SEM), and thermal gravimetric analysis (TGA). The experimental results were analyzed mesoporous carriers MCM-41. With maximum drug loading efficiency in MCM-41 determined to be 90.74%. The NYS released was prudently studied in simulated body fluid (SBF) pH 7.4 and the results proved that the release of NYS from MCM-41 was (87.79%) after 18 hr. The data of NYS released was found to be submitted a Weibull model with a correlation coefficient of (0.995). The Historical
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreThe load shedding scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po
... Show MoreCement-based adhesive (CBA) is used as a bonding agent in Carbon Fibre Reinforced Polymer (CFRP) applications as an alternative to epoxy-based adhesive due to the drawbacks of the epoxy system under severe service conditions which negatively affect the bond between the CFRP and strengthened elements. This paper reports the results of, an investigation carried out to develop two types of CBA using magnetized water (MW) for mixing and curing. Two magnetic devices (MD-I and MD-II), with different magnetic field strengths (9000 and 6000 Gauss) respectively, were employed for water magnetization. Different water flows with different water circulation times in the magnetizer were used for each device. Compressive and splitting tensile strength te
... Show MoreThis work evaluates the influence of combining twisted fins in a triple-tube heat exchanger utilised for latent heat thermal energy storage (LHTES) in three-dimensional numerical simulation and comparing the outcome with the cases of the straight fins and no fins. The phase change material (PCM) is in the annulus between the inner and the outer tube, these tubes include a cold fluid that flows in the counter current path, to solidify the PCM and release the heat storage energy. The performance of the unit was assessed based on the liquid fraction and temperature profiles as well as solidification and the energy storage rate. This study aims to find suitable and efficient fins number and the optimum values of the Re and the inlet tem
... Show More