The introduction of Industry 4.0, to improve Internet of Things (IoT) standards, has sparked the creation of 5G, or highly sophisticated wireless networks. There are several barriers standing in the way of 5G green communication systems satisfying the expectations for faster networks, more user capacity, lower resource consumption, and cost‐effectiveness. 5G standards implementation would speed up data transmission and increase the reliability of connected devices for Industry 4.0 applications. The demand for intelligent healthcare systems has increased globally as a result of the introduction of the novel COVID‐19. Designing 5G communication systems presents research problems such as optimizing resource usage, managing mobility, ensuring cost‐efficiency, managing interference, and maximizing spectral efficiency. The fast advancement of artificial intelligence (AI) in several domains yields improved performance in contrast to traditional methods. Hence, including AI in 5G standards would enhance performance by catering to diverse end‐user applications. Initially, we provide an overview of concepts such as Industry 4.0, the 5G standard, and recent developments in the sphere of wireless communications in the future. The goal is to use 5G technology to look at current research problems. We present a new architecture for Industry 4.0 and 5G‐compliant smart healthcare systems. We develop and run the proposed model to investigate the current 5G methods using the Network Simulator (NS2). The results of the simulation show that 5G resource management and interference management approaches already in use face challenges including performance trade‐offs.
A study has been done to find the optimum separators pressures of separation stations. Stage separation of oil and gas is accomplished with a series of separators operating at sequentially reduced pressures. Liquid discharged from a higher pressure separator into the lower pressure separator. The set of working separators pressures which yield maximum recovery of liquid hydrocarbon from the well fluid is the optimum set of pressures which is the target of this work.
Computer model is used to find the optimum separators pressures. The model employs the Peng-Robinson equation of state for volatile oil. Application of this model shows good improvement of al
Smart thinking requires a continuous flexible systeroatic teaching in order that the lecturer can reach at easily, The Successful individuals in smart thin king are the most knowledgably with it, where the cognitive (intuitive- systematic) style has common bases with another cognitive styles in many traits, and these two concepts are the core of theorization of the rost important cognitive styles. The present study aims to measure the Smart thinking among university lecturers according to sex variable and recognize the statistically differences significance in the level of cognitive (intuitive- systematic) style among the university lecturers according to sex variable and recognize the correlation between smart thinki
... Show MoreObjective: To identify the effect of the cube model on visual-spatial intelligence and learning the skill of spikinging in volleyball for female students, The researchers used the experimental method by designing two equivalent groups with pre- and post-measurements. Research methodology: The main research sample of (30) female students was selected from the research community represented by second-stage students in the College of Physical Education and Sports Sciences - University of Baghdad for the academic year (2024-2025). The sample was divided equally into two control and experimental groups. The researchers conducted the sample homogenization process and the equivalence process between the two groups in the variables of visua
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreSemantic segmentation realization and understanding is a stringent task not just for computer vision but also in the researches of the sciences of earth, semantic segmentation decompose compound architectures in one elements, the most mutual object in a civil outside or inside senses must classified then reinforced with information meaning of all object, it’s a method for labeling and clustering point cloud automatically. Three dimensions natural scenes classification need a point cloud dataset to representation data format as input, many challenge appeared with working of 3d data like: little number, resolution and accurate of three Dimensional dataset . Deep learning now is the po
Accurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThis study aimed at an analytical comparison of the Internal Auditing Standards issued by the Institute of Internal Auditors (IIA) and the Guidance Manual for Audit Units issued by the Federal Audit Bureau to show the compatibility and differences between them and the possibility of applying the IIA standards to economic units in Iraq. The guideline was generally not covered by all the internal audit units. There is a lack of keeping pace with changes in internal auditing at the international level and there is a need to strengthen the Guideline on Internal Auditing Standards II A), which is characterized by the preparation of an internal document containing the objectives, powers and responsibilities of the internal audit work as well a
... Show More