The pilgrimage takes place in several countries around the world. The pilgrimage includes the simultaneous movement of a huge crowd of pilgrims which leads to many challenges for the pilgrimage authorities to track, monitor, and manage the crowd to minimize the chance of overcrowding’s accidents. Therefore, there is a need for an efficient monitoring and tracking system for pilgrims. This paper proposes powerful pilgrims tracking and monitoring system based on three Internet of Things (IoT) technologies; namely: Radio Frequency Identification (RFID), ZigBee, and Internet Protocol version 6 (IPv6). In addition, it requires low-cost, low-power-consumption implementation. The proposed system can efficiently handle the pilgrimage challenges; namely: the language barrier, identifying of injured or dead pilgrims, directing lost pilgrims, knowing medical records of pilgrims, and the crowd management. Finally, another paramount characteristic of the proposed IoT-based system is allowing the authorities, the heath-givers, and the pilgrim’s family for real-time tracking and monitoring of pilgrim during the pilgrimage anytime, anywhere.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreThis study investigates the changes occurring in the province of Basra using geospatial methods and analyzes the variations in land surface temperature among the various types of land cover. For the months of July and December in the years 2013 and 2021, Landsat images were used in Landsat 8 OLI/TIRS, and satellite images were processed using ArcGIS 10.8 software. The study's categories for land use and land cover were generated through the application of supervised classification techniques, and the land surface temperature was calculated using data from a satellite sensor's brightness temperature. According to the study's findings, there has been an increase in urban areas (including barren land). From 2013 to 2021, a greater correlati
... Show MoreDoppler broadening of the 511 keV positron annihilation ??? ? was used to estimate the concentration of defects ?? different deformation levels of pure alnminum samples. These samples were compressed at room temperature to 15, 22, 28, 38,40, and 75 % thickness reduction. The two-state ^sitron-trapping model has been employed. 'I he s and w lineshape parameters were measured using high-resolution gamma spectrometer with high pure germanium detector of 2.1 keV resolution at 1.33 MeV of 60Co. The change of defects concentration (Co) with the deformation level (e) is found to obey an empirical formula of the form Cd - A £ B where A and ? are positive constants that depend mainly on the deformation procedure and the temperature at which the def
... Show MoreMonitoring and analysing of the vertical deformations or the settlements of the structures is one of the main research fields in geodetic applications, which is considered a precise periodic measurement, made at different epochs to investigate these deformations on heavy structures.
In this research, the deformation measurements were carried out on one of Baghdad University buildings,” Building of Computers Department” of dimensions (70.0 * 81.3 m.). Due to some cracks observed in their walls, it was necessary to monitor the vertical displacement of this building at some particular monitoring points by constructing a vertical network and measured in different epochs. The first epoch (zero epoch) was carried out in April 2006, the
Water Quality Index (WQI) as a tool to assess the water quality status provides advice related to the use of water quality monitoring data and it is a way for combining the complex water quality data into a single value or single statement.The present study was conducted on Al- Hilla river in the middle of Iraq from August 2012 to July 2013 at five selected stations in the river, from Al- Musaib city to Al- Hashimya at the south of Hilla to determine its suitability for aquatic environment (GWQI), drinking water (PWSI) and irrigation (IWQI).This index offers a useful representation of the overall quality of water for public or any intended use as well as indicating pollution, water quality management, and decision making. According to th
... Show MoreThe laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,
... Show MoreHiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show More