<span lang="EN-US">Increase the in population and kindergarten number, especially in urban areas made it difficult to properly manage waste. Thus, this paper proposed a system dedicated to kindergartens to manage to dispose of waste, the system can be called smart garbage based on internet of things (SGI). To ensure a healthy environment and an intelligent waste in the kindergarten management system in an integrated manner and supported by the internet of things (IoT), we presented it in detail identification, the SGI system includes details like a display system, an automatic lid system, and a communication system. This system supplied capabilities to monitor the status of waste continuously and on IoT website can show the percentage of waste placed inside the bin. And by using a Wi-Fi communication system, between the system unit and the monitoring body, to collect waste when the trash is full. The smart system proposed in this paper is the most efficient system of traditional waste management systems because it reduces the use of manpower and significantly limits the spread of waste and fully controls it. Additionally, it can be linked via the IoT to the mobile, thus forming an integrated monitoring system.</span>
In this study, the flexural performance of a new composite beam–slab system filled with concrete material was investigated, where this system was mainly prepared from lightweight cold-formed steel sections of a beam and a deck slab for carrying heavy floor loads as another concept of a conventional composite system with a lower cost impact. For this purpose, seven samples of a profile steel sheet–dry board deck slab (PSSDB/PDS) carried by a steel cold-formed C-purlins beam (CB) were prepared and named “composite CBPDS specimen”, which were tested under a static bending load. Specifically, the effects of the profile steel sheet (PSS) direction (parallel or perpendicular to the span of the specimen) using different C-purlins c
... Show MoreIntroduction and Aim: Cancers are a complex group of genetic illnesses that develop through multistep, mutagenic processes which can invade or spread throughout the body. Recent advances in cancer treatment involve oncolytic viruses to infect and destroy cancer cells. The Newcastle disease virus (NDV), an oncolytic virus has shown to have anti-cancer effects either directly by lysing cancer cells or indirectly by activating the immune system. The green fluorescent protein (GFP) has been widely used in studying the anti-tumor activity of oncolytic viruses. This study aimed to study the anticancer effect of a recombinant rNDV-GFP clone on NCI-H727 lung carcinoma cell line in vitro. Materials and Methods: The GFP gene was inserted t
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThe long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIn the present study, MCM-41 was synthesis as a carrier for poorly drugs soluble in water, by the sol-gel technique. Textural and chemical characterizations of MCM-41 were carried out by X-ray diffraction (XRD), Fourier transform infrared (FTIR), scanning electron microscope (SEM), and thermal gravimetric analysis (TGA). The experimental results were analyzed mesoporous carriers MCM-41. With maximum drug loading efficiency in MCM-41 determined to be 90.74%. The NYS released was prudently studied in simulated body fluid (SBF) pH 7.4 and the results proved that the release of NYS from MCM-41 was (87.79%) after 18 hr. The data of NYS released was found to be submitted a Weibull model with a correlation coefficient of (0.995). The Historical
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThe liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible to the d
... Show More