At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The tagged search (The aesthetic images in Mohammed Thanoun graphic) four chapters, Chapter I was concerned the statement of the research problem, the research importance and it’s needed, the goal of research in identifying the aesthetic images in the graphic of the artist's, the research limits, and identifying the most important terms, chapter II came with theoretical framework and included three chapters: chapter I was interested in the aesthetic concept. chapter II is the image aesthetic in the graphic, and chapter III is the artist experience, Chapter III specializes in research procedures: community, sample, curriculum, tool, and sample analysis. Chapter IV ended with results, including: dynamic research sample illustrated of the
... Show MoreThe process of name calling in the propaganda discourse is one of the most important methods of persuasive propaganda act, based on the ideology of working with the function, and the valuation of this function, creating a hermeneutic representation of the meaning falls within a specific format and responds to a specific function, which is the realization of the intent of the propaganda doer in persuasion and persuasion through negative and positive propaganda logic. The method of name calling has played a dangerous and horrific role in conflicts and ideological and military wars throughout history.
This study aims to find out the mechanisms of semiotics system behind discourse of propaganda far from substantive&n
... Show MoreAbstract. Froth flotation is a well-known solid-liquid separation technique. Hydrophobicity is the main driving force for such processes. Hydrophobic solids attach to air bubbles and rise up while hydrophilic or less hydrophobic species settle down. Froth can be produced with chemical frothers such as alcohols and polyglycols. However, the use of chemicals limits the use of this separation method in applications such as drinking water, food, and pharmaceutical industries. Therefore, developing a technique that produces froth without adding any chemicals would be useful to such industries. This work demonstrates that with suitable operating parameters a 27 cm froth height can be obtained in a 20 cm diameter column by using an air
... Show MoreThis paper deals with one of important topics that serve the art movement music, which is looking at the stairs of Arab music in the process of reaching to the directory musical on the subject of so-called (Photo by stairs music) and that by comparing the method used previously and the proposed rules reached by the researcher and received the patent invention, the method is easier for the musician and the author in a directory of peace Arab music when used on grades and half grades voice, and to achieve its objectives researcher dealt with the problem that is determined by the multitude of stairs leading Arab and the difficulty of keeping its catalog of music, and for being an anchor and pillar of the music was taken up and put her impor
... Show MoreThis research is the subject of "Domination and Motivation in the Sculptures of Mona the Saudi" to the study of an accomplished Arab sculptor with its varied sculptural activity between the works of the exhibition and the works of the squares, as well as its distinguished place among the contemporary Arab sculptors. This research is divided into four chapters:
The first chapter deals with the general methodological framework of the research in terms of the research problem which is focused on the question: What is the hegemony and motivation in the sculptures of Mona Saudi? The importance of research and the need for it, including the technical scientific material concerned with the sculptural achievement of t
... Show MoreThe paradise, the collection of a paradise through which it shows us the wonders of the divine-made, and reflect us the pleasure of looking and luster of beauty, and the splendor of creation, and all this is in the interest of this human being; To be a safety valve to collapse. But if this man deviates and forgot the blessed man, drowned in the vanity and vanity, and deviated from the divine method, this same heaven will disown him and reveal to him another face of destruction and devastation.
What we will see in the folds of the search, God willing
JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
A colorectal polyp (CRP) is a growth on the lining of the colon or rectum. The incidence of CRPs is rapidly increasing with age. They are most often benign. The rectum is the most commonly affected site.
To determine the incidence, clinical presentation, and histopathologic types of CRP in Iraqi patients.
It is a cross-sectional screening study conducted in the medical c
This work, introduces some concepts in bitopological spaces, which are nm-j-ω-converges to a subset, nm-j-ω-directed toward a set, nm-j-ω-closed mappings, nm-j-ω-rigid set, and nm-j-ω-continuous mappings. The mainline idea in this paper is nm-j-ω-perfect mappings in bitopological spaces such that n = 1,2 and m =1,2 n ≠ m. Characterizations concerning these concepts and several theorems are studied, where j = q , δ, a , pre, b, b.