The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobile SN, besides prolong the network lifetime in compare with static SN.
The objective of this study is to determine levels of some pro-inflammatory cytokines (IL-12 and SIL-2R) in pregnant women with polycystic ovary syndrome (PCOS) and also to determine incidence of spontaneous abortion during first trimester in pregnant women with PCOS compared with non-PCOS pregnant women. This Study was performed on (93) women, consisted of: 1- (63) pregnant women during the first trimester, which included:A- (33)PCOS pregnant women and subdivided into the following groups: (20) successful pregnant PCOS, (7) blighted Ovum PCOS and (6) missed abortion PCOS. B- (30) non-PCOS pregnant women, which included: (27) successful pregnant control and (3) non-PCOS pregnant women were withdrawn from this study because of their abortion
... Show MoreAbstract: This article is a comparative analysis of the concept and types of homonyms in Russian and Arabic. Homonyms are lexical units that have the same sound but different meanings. The study of homonymy in different languages can help reveal the features of the semantic structure and syntactic rules of each language. The article discusses the main aspects of homonymy in Russian and Arabic, as well as a comparative analysis of the types of homonyms that exist in both languages. The study includes an analysis of the semantic meanings of homonyms, their use in context, and possible differences in syntactic features that may affect their interpretation and perception by native speakers of these languages. The purpose of the article is to id
... Show MorePurpose of research: The purpose of the article is to conduct a comparative analysis of the concept and types of puns in the Russian and Arabic languages. The main focus is on identifying similarities and differences in the definition of a pun, as well as analyzing its various types in both languages. The purpose of the study is to understand how puns are used to achieve comic or semantic effect in different cultural contexts.
Methods: The study includes an analysis of literature providing information about puns in Russian and Arabic. For comparative analysis, methods were used to compare concepts, definitions and types of puns in both languages. The phonetic, semantic and syntactic aspects of the pun are considered,
... Show MoreIn this paper, we proved coincidence points theorems for two pairs mappings which are defined on nonempty subset in metric spaces by using condition (1.1). As application, we established a unique common fixed points theorems for these mappings by using the concept weakly compatible (R-weakly commuting) between these mappings.
Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreBilastine (BL) is a novel non-sedating second-generation antihistamine, and its bioavailability is about 60%. Objective: To compare the bioavailability of prepared oral self-nanoemulsions of BL (BL-SNE) with that of pure BL and marketed tablets. Methods: Four groups of Wistar rats were used in this study, each with six rats weighing between 200 and 250 g. They were treated orally using a a gavage tube. The groups were fed either with conventional tablets ("Alerbix®") after being ground and dispersed with deionized water (DIW), treated with BL-SNE or fed with pure BL powder suspension. The fourth group did not receive any medication. The concentration of BL in the rat’s plasma was measured using HPLC. We used Trandolapril as an an interna
... Show More