6G Wireless Communications Networks: A Comprehensive Survey
...Show More Authors
Rationale, aims and objectives: A review of studies published over the last six years gives update about this hot topic. In the middle of COVID-19 pandemic, this study findings can help understand how population may perceive vaccinations. The objectives of this study were to review the literature covering the perceptions about influenza vaccines and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM). Methods: A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions, and Middle East. Empirical studies that dealt with people/ HCW perceptions of influenza vaccine in the Middle East and writt
... Show MoreExploring the antibacterial potential of neem oil (Azadirachta indica) in combination with gentamicin (GEN) against pathogenic molds, especially Pseudomonas aeruginosa, has drawn concern due to the quest for natural treatment options against incurable diseases. Prospective research directions include looking for natural cures for many of the currently incurable diseases available now. microbial identification system, were used to identify the isolates. The research utilized a range of methods, such as the diffusion agar well (AWD) assays, TEM (transmission electron microscopy) analysis, minimum inhibitory concentration (MIC) assays, and real-time PCR (RT-qPCR) to analyze bacterial expression and the antibacterial action of neem oil (Azadira
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreAbstract
The present paper attempts to detect the level of (COVID-19) pandemic panic attacks among university students, according to gender and stage variables.
To achieve this objective, the present paper adopts the scale set up by (Fathallah et al., 2021), which has been applied electronically to a previous cross-cultural sample consisting of (2285) participants from Arab countries, including Iraq. The scale includes, in its final form, (69) optional items distributed on (6) dimensions: physical symptoms (13) items, psychological and emotional symptoms (12) items, cognitive and mental symptoms (11) items, social symptoms (8) items, general symptoms (13) items and daily living practices (12) items
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8