The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobile SN, besides prolong the network lifetime in compare with static SN.
The Marshlands cover an area of about 24% of the land area of Iraq, which gives it special importance to the country with its resources, resources and human capabilities, and because the conditions of this region are different from other areas environmentally and living necessitates subject to certain design principles achieve sustainable environmental integration to maintain them from For future generations, the idea of research is crystallized by the interest of environmental organizations and urban designers in planning and establishing special laws to exploit the region environmentally, economically and tourism, especially after the current focus of the country's economic revival. T tourism and begin the development
... Show MoreBackground: Breast cancer is the first one among Iraqi females. Most of them present later for diagnosis. Early detection center in tertiary hospital practice uses FNAB for early diagnosis. Publications on accuracy of this detection are scarce.
Objective: To test the accuracy of FNAB in breast lump diagnosis.
Methods: Diagnostic test accuracy study, on 204 women with breast lump, attending the oncology department in 2017.
Results: Fine-needle aspiration biopsy diagnosis of histologically malignant cases were, malignant in 89 (87.3%), suspicious of malignancy in 5 (4.9%), and benign in 4 (3.9%). Complete sensitivity was 87.3%, and specificity
... Show MoreIn the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonical de
... Show MoreDiabetic foot ulcer (DFU) is one of the chronic wound infection and leads to non-traumatic lower limb amputation. Advances in diabetes research are significant and much needed because diabetes is on the rise worldwide and is considered by some experts already to be at an epidemic level. Among diabetic patients 70% were males and 30% were females. Aerobic bacteria 104(82%) were the most frequently isolated than anaerobic bacteria 23(18%). Among aerobes Gram negative bacteria 67(64.4%) were more commonly isolated than Gram positive 37(35.5%). The three most frequently found that S. aureus 28(22%) followed by P. mirabilis 22(17.3%) then E. coli 14(11%). Among anaerobic bacteria Gram negative bacteria 16(69.5%) were predominantly isolated th
... Show More The current paper studied the concept of right n-derivation satisfying certified conditions on semigroup ideals of near-rings and some related properties. Interesting results have been reached, the most prominent of which are the following: Let M be a 3-prime left near-ring and A_1,A_2,…,A_n are nonzero semigroup ideals of M, if d is a right n-derivation of M satisfies on of the following conditions,
d(u_1,u_2,…,(u_j,v_j ),…,u_n )=0 ∀ 〖 u〗_1 〖ϵA〗_1 ,u_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n ϵA〗_u;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=0 ∀u_1,v_1 〖ϵA〗_1,u_2,v_2 〖ϵA〗_2,…,u_j,v_j ϵ A_j,…,〖u_n,v_n ϵA〗_u ;
d((u_1,v_1 ),(u_2,v_2 ),…,(u_j,v_j ),…,(u_n,v_n ))=(u_
Comes interest in the subject matter in the selection of the Family industry globally as one of the important industries which have developed a clear and significant in recent years, to look at these products and designs to their functional importance have appeared in recent years, the phenomenon of the small spaces because of housing Population density showed the need to find a spare Furniture fit these small spaces On this basis, determine the objective of this research is to arrive at a design techniques for dual-family employee for small spaces research sample included a double family manufactured in laboratories industry Furniture in Baghdad and local research sample includes family double Decker.Research focused on the first four c
... Show MoreNon-additive measures and corresponding integrals originally have been introduced by Choquet in 1953 (1) and independently defined by Sugeno in 1974 (2) in order to extend the classical measure by replacing the additivity property to non-additive property. An important feature of non –additive measures and fuzzy integrals is that they can represent the importance of individual information sources and interactions among them. There are many applications of non-additive measures and fuzzy integrals such as image processing, multi-criteria decision making, information fusion, classification, and pattern recognition. This paper presents a mathematical model for discussing an application of non-additive measures and corresp
... Show MoreCryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis
Background: Cervical lymph nodes are prone to involved by a number of pathologic processes. They are common sites for lymphoma, metastasis, and reactive enlargement in a number of conditions. Aims of the study:-Clinical evaluation of patients with cervical lymphadenopathy. Differentiation between benign and malignant lymph nodes by means of ultra sounds (US) and Correlate the US findings with cytological and/or histopathological findings of cervical lymph nodes. Subjects, Materials and Methods:-The present study was carried out over a period of 6 months and included 81 patients of different age groups presenting with cervical lymphadenopathy. Each patient was examined clinically, then comprehensive sonographic examination of the neck for
... Show MoreBackground: This study aimed to determine the amount of fluoride in commercially available bottled drinking water in Al-Basra city, Iraq Materials and Methods: Eleven brands of bottled drinking water were obtained from supermarkets in Al-Basra city, Iraq. Five samples of 10 ml. were taking from each one of brands and the fluoride was determined by using fluoride ion selective electrode. Results: The highest fluoride concentration was present in BADIOT brand (1.174 mg/L) while the lowest was in Barakat brand (0.038 mg/L). One way ANOVA test showed a highley significant difference among different commercially branded types. Coclusions: Bottled water available in Al-Basra city contains less concentration of fluoride ion than normal values
... Show More