في السنوات الأخيرة، أدى التقدم التكنولوجي في إنترنت الأشياء (IoT) وأجهزة الاستشعار الذكية إلى فتح اتجاهات جديدة وإعطاء حلول عملية في مختلف قطاعات الحياة. يتم التعرف على إنترنت الأشياء كتنولوجيا حديثة تربط بين مختلف انواع الشبكات. تم تحسين أنواع مختلفة من قطاعات الرعاية الصحية في المجال الطبي بناءً على هذه التكنولوجيا. أحد هذه القطاعات الهامة هو نظام مراقبة الصحة (HMS). تعتبر مراقبة المريض عن بعد لاسلكيًا وبتكلفة منخفضة أمرًا بالغ الأهمية في هذا المجال. في هذا العمل، تم اقتراح نظام مراقبة صحة المريض في الوقت الحقيقي وبتكلفة منخفضة. يتم دمج أنواع مختلفة من أجهزة الاستشعار في شبكة اتصالات لاسلكية لجمع الإشارات الفسيولوجية للمريض عن بعد وإرسالها إلى المختص في أسرع وقت ممكن. يتكون االنظام المقترح من عدد من أجهزة الاستشعار الذكية التي تقيس معلمات مختلفة وهي: عدد نبضات القلب بالدقيقة، درجة حرارة الجسم، وSPO2 (تشبع الأكسجين). تُستخدم هذه الحساسات لحساب معدل ضربات قلب المريض ودرجة حرارة الجسم ونسبة تشبع الأكسجين للمريض على التوالي. يتم عرض حالة المريض اما على شاشة OLED اوباستخدام تطبيق Blynk. في هذا النظام نستخدم لوحة Raspberry Pi Pico W كوحدة تحكم دقيقة مع مفهوم الحوسبة السحابية. بحيث يتم استخدام لوحة Raspberry Pi Pico W لنقل البيانات لاسلكيًا على تقنية إنترنت الأشياء باستخدام تطبيق Blynk. يتم نقل المعلمات الحيوية للمريض عن بعد عبر شبكة Wi-Fi مما يساعد في مراقبة المعلومات الصحية للمرضى لاسلكيًا وفي الوقت الحقيقي. من خلال النتائج التي تم الحصول عليها وجد ان البيانات التي تم الحصول عليها من المريض يتم نقلها بسرعة كبيرة ويمكننا فحص العديد من المرضى عن بعد من خلال الحفاظ على مسافة مناسبة مع المرضى. تم مقارنة النظام المقترح مع الانظمة الموجودة عن طريق قياس العلامات الحيوية لعدد من الأشخاص وأظهرت النتائج أن البيانات التي تم الحصول عليها من الأشخاص متقاربة جدا. علاوة على ذلك، فقد وجد أن النظام المقترح ذو تكلفة منخفضة مقارنة بالأجهزة الأخرى المتوفرة تجاريا.
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreWhenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas
... Show More<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show MoreSurgical site infections are the second most common type of adverse events occurring in hospitalized patients. Surgical antibiotic prophylaxis refers to the use of preoperative and postoperative antibiotics to decrease the incidence of postoperative wound infections. The objective of this study was to evaluate the antibiotic administration pattern for surgical antibiotic prophylaxis and the adherence to American Society of Health-System Pharmacists surgical antibiotic prophylaxis guideline in Medical City Teaching Hospitals/Baghdad. The medical records of one hundred patients who underwent elective surgical procedures were reviewed. Adherence to the recommendations of American society of health‑system pharmacists guideline was ass
... Show MoreCommunication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p
Sphingolipids are key components of eukaryotic membranes, particularly the plasma membrane. The biosynthetic pathway for the formation of these lipid species is largely conserved. However, in contrast to mammals, which produce sphingomyelin, organisms such as the pathogenic fungi and protozoa synthesize inositol phosphorylceramide (IPC) as the primary phosphosphingolipid. The key step involves the reaction of ceramide and phosphatidylinositol catalysed by IPC synthase, an essential enzyme with no mammalian equivalent encoded by the AUR1 gene in yeast and recently identified functional orthologues in the pathogenic kinetoplastid protozoa. As such this enzyme represents a promising target for novel anti-fungal and anti-protozoal drugs. Given
... Show MoreThe automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve
... Show More