In recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate
... Show MoreA remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe long-term monitoring of land movements represents the most successful application of the Global Navigation Satellite System (GNSS), particularly the Global Positioning System. However, the application of long term monitoring of land movements depends on the availability of homogenous and consistent daily position time series of stations over a period of time. Such time series can be produced very efficiently by using Precise Point Positioning and Double Difference techniques based on particular sophisticated GNSS processing softwares. Nonetheless, these rely on the availability of GNSS products which are precise satellite orbit and clock, and Earth orientation parameters. Unfortunately, several changes and modifications have been mad
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreIntroduction: Breast cancer is a significant global health concern, affecting millions of women worldwide. While advancements in diagnosis and treatment have improved survival rates, the impact of this disease extends beyond physical health. It also significantly influences a woman's lifestyle and overall well-being. Objectives: The current study intends to analyze the lifestyle of breast cancer patients who are receiving therapy or are being followed up at the Oncology Teaching Hospital in Medical City, Baghdad, Iraq. Method: The present study uses a descriptive design with an application of an evaluation approach. A convenience sample of 100 women with breast cancer was selected from the Teaching Oncology Hospital at the Medical C
... Show MoreFrequently, Load associated mode of failure (rutting and fatigue) as well as, occasionally, moisture damage in some sections poorly drained are the main failure types found in some of the newly constructed road within Baghdad as well as other cities in Iraq. The use of hydrated lime in pavement construction could be one of the possible steps taken in the direction of improving pavement performance and meeting the required standards. In this study, the mechanistic properties of asphalt concrete mixes modified with hydrated lime as a partial replacement of limestone dust mineral filler were evaluated. Seven replacement rates were used; 0, 0.5, 1, 1.5, 2, 2.5 and 3 percent by weight of aggregate. Asphalt concrete mixes were prepared at their
... Show MoreObjective(s): To evaluate of nurses practice toward orthopaedic wound infection and to determine the
relationship between orthopaedic nurses practice and their demographic data characteristic
Methodology: A descriptive study was carried out at orthopaedic wards of Baghdad Teaching Hospital started
from February 1
st, 2011 to August 30th, 2011. A non-probability sample of (39) orthopaedic nurses who were
working in orthopaedic wards were selected from Baghdad Teaching Hospital. The data were collected through
the use of questionnaire , which consists of two parts (1)Demographic data form that consists of a(10) items
and (2) orthopaedic nurses practice form that consists of (4)sections contain (69) items, by mean of di