في السنوات الأخيرة، أدى التقدم التكنولوجي في إنترنت الأشياء (IoT) وأجهزة الاستشعار الذكية إلى فتح اتجاهات جديدة وإعطاء حلول عملية في مختلف قطاعات الحياة. يتم التعرف على إنترنت الأشياء كتنولوجيا حديثة تربط بين مختلف انواع الشبكات. تم تحسين أنواع مختلفة من قطاعات الرعاية الصحية في المجال الطبي بناءً على هذه التكنولوجيا. أحد هذه القطاعات الهامة هو نظام مراقبة الصحة (HMS). تعتبر مراقبة المريض عن بعد لاسلكيًا وبتكلفة منخفضة أمرًا بالغ الأهمية في هذا المجال. في هذا العمل، تم اقتراح نظام مراقبة صحة المريض في الوقت الحقيقي وبتكلفة منخفضة. يتم دمج أنواع مختلفة من أجهزة الاستشعار في شبكة اتصالات لاسلكية لجمع الإشارات الفسيولوجية للمريض عن بعد وإرسالها إلى المختص في أسرع وقت ممكن. يتكون االنظام المقترح من عدد من أجهزة الاستشعار الذكية التي تقيس معلمات مختلفة وهي: عدد نبضات القلب بالدقيقة، درجة حرارة الجسم، وSPO2 (تشبع الأكسجين). تُستخدم هذه الحساسات لحساب معدل ضربات قلب المريض ودرجة حرارة الجسم ونسبة تشبع الأكسجين للمريض على التوالي. يتم عرض حالة المريض اما على شاشة OLED اوباستخدام تطبيق Blynk. في هذا النظام نستخدم لوحة Raspberry Pi Pico W كوحدة تحكم دقيقة مع مفهوم الحوسبة السحابية. بحيث يتم استخدام لوحة Raspberry Pi Pico W لنقل البيانات لاسلكيًا على تقنية إنترنت الأشياء باستخدام تطبيق Blynk. يتم نقل المعلمات الحيوية للمريض عن بعد عبر شبكة Wi-Fi مما يساعد في مراقبة المعلومات الصحية للمرضى لاسلكيًا وفي الوقت الحقيقي. من خلال النتائج التي تم الحصول عليها وجد ان البيانات التي تم الحصول عليها من المريض يتم نقلها بسرعة كبيرة ويمكننا فحص العديد من المرضى عن بعد من خلال الحفاظ على مسافة مناسبة مع المرضى. تم مقارنة النظام المقترح مع الانظمة الموجودة عن طريق قياس العلامات الحيوية لعدد من الأشخاص وأظهرت النتائج أن البيانات التي تم الحصول عليها من الأشخاص متقاربة جدا. علاوة على ذلك، فقد وجد أن النظام المقترح ذو تكلفة منخفضة مقارنة بالأجهزة الأخرى المتوفرة تجاريا.
This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreSensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps
... Show MoreThis paper demonstrates the design of an algorithm to represent the design stages of fixturing system that serve in increasing the flexibility and automation of fixturing system planning for uniform polyhedral part. This system requires building a manufacturing feature recognition algorithm to present or describe inputs such as (configuration of workpiece) and built database system to represents (production plan and fixturing system exiting) to this algorithm. Also knowledge – base system was building or developed to find the best fixturing analysis (workpiece setup, constraints of workpiece and arrangement the contact on this workpiece) to workpiece.
Geographic Information Systems (GIS) are obtaining a significant role in handling strategic applications in which data are organized as records of multiple layers in a database. Furthermore, GIS provide multi-functions like data collection, analysis, and presentation. Geographic information systems have assured their competence in diverse fields of study via handling various problems for numerous applications. However, handling a large volume of data in the GIS remains an important issue. The biggest obstacle is designing a spatial decision-making framework focused on GIS that manages a broad range of specific data to achieve the right performance. It is very useful to support decision-makers by providing GIS-based decision support syste
... Show MoreThis work investigates a simulation model of an underwater optical wireless communication (UOWC) system. Several water scenarios are considered: Harbor I (HA-I), Harbor II (HA-II), Coastal Ocean (CO), Clear Ocean (CL), and Pure Sea (PU). A laser diode (LD) with modulation schemes (NRZ-OOK) transmits data at various speeds of 2.5 Gbps, 5 Gbps, and 10 Gbps. To identify the optical signal, a single-photon detection (SPD), APD and PIN photodiodes are utilized. The analytical evaluation of the performance is executed using Q-factor, received power and bit error rate (BER). According to the results, the PU achieved an underwater distance of 35.5 m, 35 m, 34.5 m, for data tran
The plethora of the emerged radio frequency applications makes the frequency spectrum crowded by many applications and hence the ability to detect specific application’s frequency without distortion is a difficult task to achieve.
The goal is to achieve a method to mitigate the highest interferer power in the frequency spectrum in order to eliminate the distortion.
This paper presents the application of the proposed tunable 6th-order notch filter on Ultra-Wideband (UWB) Complementary Metal-Oxide-Semiconductor (CMOS) Low Noise
The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show More