Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classification approach, hence strengthening the safety of such networks. Feature extraction process is done by using Linear Regression-Based Principal Component Analysis (LR-PCA). The test results demonstrated that the proposed IGO-ANN method attains the greatest performance in terms of accuracy, end to end delay and packet delivery ratio regarding trusted WBAN nodes classification than certain existing methods.
Landlocked countries are displayed geopolitical new geo-political and intended to
countries that do not have sea views, a phenomenon present in four continents of the world
are: Africa, Europe, and Asia, and South America and the number arrived at the present time
to the (44) state the largest number of them in the continent it arrived in Africa (16) countries
in Asia (13) countries and Europe (13) In the State of South America two. This phenomenon
emerged due to the division of federations and empires and colonial treaties and others. But
the negative effects suffered by these countries may vary from one country to another, since
these countries in the continent of Europe, for example, is different from the same cou
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreEarth’s climate changes rapidly due to the increases in human demands and rapid economic growth. These changes will affect the entire biosphere, mostly in negative ways. Predicting future changes will put us in a better position to minimize their catastrophic effects and to understand how humans can cope with the new changes beforehand. In this research, previous global climate data set observations from 1961-1990 have been used to predict the future climate change scenario for 2010-2039. The data were processed with Idrisi Andes software and the final Köppen-Geiger map was created with ArcGIS software. Based on Köppen climate classification, it was found that areas of Equator, Arid Steppes, and Snow will decrease by 3.9 %, 2.96%, an
... Show MoreBackground: Penetrating neck injuries are common problem in our country due to increasing violence, terrorist bombing and military operations.
These injuries are potentially life threating and need great attention and proper management.
Objective: The aim of this study is to focus on the importance of anatomical zonal classification of the neck in the management of penetrating injuries of the visceral compartment of the Neck.
Methods :70 patients with various injuries who were managed at causality unit and Otolaryngology department in Al-Kindy Teaching Hospital during aperiod from January 1st 2015 to October 31st 2015.
The study carried on those patient depending on proper clinical examination and their urgent management.
The successful implementation of deep learning nets opens up possibilities for various applications in viticulture, including disease detection, plant health monitoring, and grapevine variety identification. With the progressive advancements in the domain of deep learning, further advancements and refinements in the models and datasets can be expected, potentially leading to even more accurate and efficient classification systems for grapevine leaves and beyond. Overall, this research provides valuable insights into the potential of deep learning for agricultural applications and paves the way for future studies in this domain. This work employs a convolutional neural network (CNN)-based architecture to perform grapevine leaf image classifi
... Show MoreDisease diagnosis with computer-aided methods has been extensively studied and applied in diagnosing and monitoring of several chronic diseases. Early detection and risk assessment of breast diseases based on clinical data is helpful for doctors to make early diagnosis and monitor the disease progression. The purpose of this study is to exploit the Convolutional Neural Network (CNN) in discriminating breast MRI scans into pathological and healthy. In this study, a fully automated and efficient deep features extraction algorithm that exploits the spatial information obtained from both T2W-TSE and STIR MRI sequences to discriminate between pathological and healthy breast MRI scans. The breast MRI scans are preprocessed prior to the feature
... Show MoreThe study employs Critical Discourse Analysis (CDA) to analyze how technological discourses are influenced by AI-generate d English texts. The research marries Fairclough’s three-dimensional discourse analysis, Van Dijk’s socio-cognitive approach, and Corpus-Assisted Discourse Studies (CADS) in the use of mixed-methods research, integrating primarily qualitative analysis with quantitative corpus-based data, to perform a thorough analysis of twenty AI-produced English texts. The findings identify the sophisticated linguistic mechanisms through which AI language employs modality, nominalization, passive voice, and interdiscursive blending to normalize and legitimize dominant contemporary ideologies. These mechanisms serve to legitimize te
... Show MoreThis study focuses on how tax administrations in Iraq use Artificial Intelligence (AI) techniques to monitor tax evasion for individuals and companies to achieve Tax Compliance (TC). AI was measured through four dimensions: Advanced Data Analytics Techniques (ADAT), Explainable AI (EAI), Machine learning (ML), and Robotic Process Automation (RPA). At the same time, TC was measured through registration, accounting, and tax payment stages. We relied on the questionnaire form to measure the variables. A sample of employees in the General Tax Authority in Iraq was selected, and a questionnaire was distributed to 132 people. The results indicated that the dimensions of AI affect achieving TC at all stages. This study provides evidence of using A
... Show More