في السنوات الأخيرة، أدى التقدم التكنولوجي في إنترنت الأشياء (IoT) وأجهزة الاستشعار الذكية إلى فتح اتجاهات جديدة وإعطاء حلول عملية في مختلف قطاعات الحياة. يتم التعرف على إنترنت الأشياء كتنولوجيا حديثة تربط بين مختلف انواع الشبكات. تم تحسين أنواع مختلفة من قطاعات الرعاية الصحية في المجال الطبي بناءً على هذه التكنولوجيا. أحد هذه القطاعات الهامة هو نظام مراقبة الصحة (HMS). تعتبر مراقبة المريض عن بعد لاسلكيًا وبتكلفة منخفضة أمرًا بالغ الأهمية في هذا المجال. في هذا العمل، تم اقتراح نظام مراقبة صحة المريض في الوقت الحقيقي وبتكلفة منخفضة. يتم دمج أنواع مختلفة من أجهزة الاستشعار في شبكة اتصالات لاسلكية لجمع الإشارات الفسيولوجية للمريض عن بعد وإرسالها إلى المختص في أسرع وقت ممكن. يتكون االنظام المقترح من عدد من أجهزة الاستشعار الذكية التي تقيس معلمات مختلفة وهي: عدد نبضات القلب بالدقيقة، درجة حرارة الجسم، وSPO2 (تشبع الأكسجين). تُستخدم هذه الحساسات لحساب معدل ضربات قلب المريض ودرجة حرارة الجسم ونسبة تشبع الأكسجين للمريض على التوالي. يتم عرض حالة المريض اما على شاشة OLED اوباستخدام تطبيق Blynk. في هذا النظام نستخدم لوحة Raspberry Pi Pico W كوحدة تحكم دقيقة مع مفهوم الحوسبة السحابية. بحيث يتم استخدام لوحة Raspberry Pi Pico W لنقل البيانات لاسلكيًا على تقنية إنترنت الأشياء باستخدام تطبيق Blynk. يتم نقل المعلمات الحيوية للمريض عن بعد عبر شبكة Wi-Fi مما يساعد في مراقبة المعلومات الصحية للمرضى لاسلكيًا وفي الوقت الحقيقي. من خلال النتائج التي تم الحصول عليها وجد ان البيانات التي تم الحصول عليها من المريض يتم نقلها بسرعة كبيرة ويمكننا فحص العديد من المرضى عن بعد من خلال الحفاظ على مسافة مناسبة مع المرضى. تم مقارنة النظام المقترح مع الانظمة الموجودة عن طريق قياس العلامات الحيوية لعدد من الأشخاص وأظهرت النتائج أن البيانات التي تم الحصول عليها من الأشخاص متقاربة جدا. علاوة على ذلك، فقد وجد أن النظام المقترح ذو تكلفة منخفضة مقارنة بالأجهزة الأخرى المتوفرة تجاريا.
Significant advancements in nanoscale material efficiency optimization have made it feasible to substantially adjust the thermoelectric transport characteristics of materials. Motivated by the prediction and enhanced understanding of the behavior of two-dimensional (2D) bilayers (BL) of zirconium diselenide (ZrSe2), hafnium diselenide (HfSe2), molybdenum diselenide (MoSe2), and tungsten diselenide (WSe2), we investigated the thermoelectric transport properties using information generated from experimental measurements to provide inputs to work with the functions of these materials and to determine the
The problem of research was to identify after the use of cost technology based on specifications in the validity of determining and measuring the costs of the implementation of contracting, by applying to al-Mansour General Construction Contracting Company as an appropriate alternative to the traditional costing system currently adopted, which is characterized by many shortcomings and weaknesses Which has been reflected in the validity and integrity of the calculations. To solve this problem, the research was based on the premise that: (The application of cost technology based on specifications will result in calculating the cost of the product according to the specification required by the customer, to meet his wishes properly and witho
... Show MoreIraqi industrial units face strong competition due to many problems including1- high production costs2- weak interest in studying the market3- lack of government support for their products4- dumping the market with imported products with specifications and a competitive price as well as adopting the traditional cost system in calculating costs that do not provide appropriate information for pricing decisions Which requires studying and analyzing these problems and dealing with them by adopting modern technologies so that they can compete, so the research aims to show the knowledge bases of technology Activity- Based Costing, with an indication of the role of technology Activity- Based Costing in rationalizing the tax In, and the
... Show MoreThis work concentrates on the effect of a flex-skin trailing edge flap on the aerodynamic characteristics of SD7037 airfoil at low Reynolds numbers, in the range of 2^10 to 5^10 using computational methods. The study used a range of angle of attack (AOA) associated with the take-off phase and different flap angles. The numerical model was set up in Siemens STAR-CCM+ package using the κ-ω shear stress transport turbulence model and the (γ-Reθ) transition model which ensured the approximate solution of Navier-Stokes equations. The verification of the computational solution was done by the comparison with the available experimental data of the plain flap, and it was discovered that the results matched pretty well at lower AoAs. Results in
... Show MoreObjective(s): The study aims to evaluating the quality of nursing care provided to children under five years to compare between quality related to type of health sectors; to determine the quality of nursing care and to compare between such care in Baquba Health Care Sector I and II.
Methodology: A descriptive study is carried out for the period from December 15th 2019 to May 1st 2020. A purposive "non- probability" sample, of (60) staff nurse and (60) children is selected. An adopted questionnaire has been selected for the study which consists of three parts. The first part is nurses’ socio-demographic characteristic; the second part is ch
... Show MoreThis study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More