The limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show MoreIntroduction: Although it is discouraged, community pharmacy customers can obtain oral corticosteroids (OCSs) without prescriptions from some community pharmacies in Iraq. Medication abuse is defined as the use of medication for non-medical reasons. Objectives: The study aimed to determine demographics, beliefs, and perceptions associated with the abuse of oral corticosteroids for non-illness reasons among community pharmacy customers. Methods: This cross-sectional study was conducted in fall 2018 in four provinces in Iraq. Customers of 19 community pharmacies asking for OCSs for themselves without a prescription were administered a paper survey. This study used the Theory of Reasoned Action (TRA) to measure the relation
... Show MoreBackground: Colonization of soft denture liners by Candida albicans and other microorganisms continued to be a serious problem. The aim of this study was to evaluate the effect of incorporating silver nanoparticles into heat cured acrylic-based soft denture liner on the antifungal activity, and on water sorption, solubility, shear bond strength and color change of the soft lining material. Furthermore, evaluating the amount of silver released. Materials and methods: Silver nanoparticles were incorporated into soft denture liner in different percentages (0.05%, 0.1% and 0.2% by weight). Four hundred and twenty specimens were prepared and divided into five groups according to the test to be performed. The antifungal activity of the soft liner
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreApplications of quantitative methods, which had been explicit attention during previous period (the last two centuries) is the method of application sales man or traveling salesman method. According to this interest by the actual need for a lot of the production sectors and companies that distribute their products, whether locally made or the imported for customers or other industry sectors where most of the productive sectors and companies distributed always aspired to (increase profits, imports, the production quantity, quantity of exports. etc. ...) this is the part of the other hand, want to behave during the process of distribution routes that achieve the best or the least or most appropriate.
... Show More