Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fundamental security functions demanded by organizations and whether these functions have been securely developed. Therefore, this paper proposes a security framework for mobile data that combines core security mechanisms to avoid these problems and protects sensitive information without spending time and money deploying several new applications.
Magneto-rheological (MR) valve is one of the devices generally used to control the speed of Hydraulic actuator of MR fluid. The performance of valve depends on the magnetic circuit design. Present study deals with a new design of MR valve. A mathematical model for the MR valve is developed and the simulation is carried out to evaluate the newly developed MR valve. The design of the magnetic circuit is accomplished by magnetic finite element software such as Finite Element Method Magnetic (FEMMR). The model dimensions of MR valve, material properties are taken into account. The results of analysis are presented in terms of magnetic strength H and magnetic flux density B. The simulation results based on the proposed model indicate that the ef
... Show MoreThe nucleon momentum distributions (NMD) and elastic electron scattering form factors of the ground state for some 1f-2p-shell nuclei, such as 58Ni, 60Ni, 62Ni, and 64Ni
isotopes have been calculated in the framework of the coherent fluctuation model (CFM) and expressed in terms of the weight function lf(x)l2 . The weight function (fluctuation function) has been related to the nucleon density distribution (NDD) of the nuclei and determined from the theory and experiment. The NDD is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of the l
This study proposes a hybrid predictive maintenance framework that integrates the Kolmogorov-Arnold Network (KAN) with Short-Time Fourier Transform (STFT) for intelligent fault diagnosis in industrial rotating machinery. The method is designed to address challenges posed by non-linear and non-stationary vibration signals under varying operational conditions. Experimental validation using the FALEX multispecimen test bench demonstrated a high classification accuracy of 97.5%, outperforming traditional models such as SVM, Random Forest, and XGBoost. The approach maintained robust performance across dynamic load scenarios and noisy environments, with precision and recall exceeding 95%. Key contributions include a hardware-accelerated K
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show MoreIn this research , design and study a (beam expander) for the Nd – YAG laser with (1.06 ?m) Wavelength has been studied at 5X zoom with narrow diversion in the room temperature. by using (ZEMAX) to study the system. Evaluate its performance via (ZEMAX) outputs, as bright Spot Diagram via (RMS), Ray Fan Plot, Geometric Encircled Energy and the value of Focal shift. Then study the effect of field of view on the outputs in the room temperature.
Background: Mobile phones are approximately widely used everywhere like in hospital wards, clinics and universities as well as biomedical laboratories. They have become very important tool in students’ life. In contrast, these tools carry many harmful bacteria which are responsible for infectious diseases in human because they serve as a reservoir for different pathogens. Current study was aimed to isolate bacteria from students’ mobile phones at the Institute of Medical Technology/Al-Mansour/The Middle Technical University, Baghdad, Iraq. Also, the study investigated microbial resistance to many antimicrobial agents as well as the appropriate remedial measures. Method: Four hundred and fifty swabs from mobile phones were collected from
... Show MoreAn update of our research is the first to develop and reform the agricultural sector . and promoting production and productivity of this sector multi-sources , which is the management and beekeeping one source . Been applied to the style of beekeeping mobile promiscuous includes twentieth cell in the Iraqe project of mussiab . in which there exist a variety of crops and trees .
Experiment had proved successful and led to raise the level of npoduction of single Dell of the honey to 49 kg over the previous year and surpassed the average production percell in the province of Babylon , which the amount of 13.945 kg , another
... Show MoreThe important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show More