The orbital motion and longitude for some Jupiter's satellites (Amaletha, Europa, Ganymede and Callisto) were calculated from two different locations Iraq and Syria. A program was designed, the input parameters were the desired year, month, day and the longitude of the location, the output parameters results were applied in form of a file, and this file includes the longitude, orbital motion, and local time of these satellites. A specific date 1-10-2013 was taken, the results of longitude was (20-336) º and orbital motion was (92-331) º for both Iraq and Syria location with observing time (05:24:14-15:18:10) for Iraq and (04:56:33-14:50:30) for Syria. The difference in time between the two locations was constant (00:45:00), these results were compared with the results of Gilbert in 1974, but he worked only on the longitude with respect to the universal time, which his values was (34-296)º.
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThis study examined >140 relevant publications from the last few years (2018–2021). In this study, classification was reviewed depending on the operation's progress. Electrocoagulation (EC), electrooxidation (EO), electroflotation (EF), electrodialysis (ED), and electro-Fenton (EFN) processes have received considerable attention. The type of action (individual or hybrid) for each electrochemical procedure was evaluated, and statistical analysis was performed to compare them as a new manner of reviewing cited papers providing a massive amount of information efficiently to the readers. Individual or hybrid operation progress of the electrochemical techniques is critical issues. Their design, operation, and maintenance costs vary depending o
... Show MoreIn this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp
... Show MoreThe rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show Moreresearch summary
Praise be to Allah، and prayers and peace be upon His Messenger and His chosen one، his family، companions and his family and his family.
After that، this is a study on the question of the claim، as one of the controversial questions that are the mainstay of debates، and I looked at it: the limit of the question of the claim، its importance، its impact، its aspects of corruption، its sections، and the representation of its sections of the fundamentalist controversy;
The research was according to the following plan:
Introduction، in which she mentioned: the importance of the research topic and the reason for its selection، its questions، its l
... Show MoreKnowing the nature of the relationship in federal systems lies in studying the political, social, economic and cultural forces, for their role in laying the foundations and the federal system. No matter how important the pillars of that system are, and through this research, we will learn how the political elites were able to crystallize this unique system, until it became one of the political systems that some countries seek to copy and apply its experience.