At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
This study is based on the basic idea: that human communication does not stop at the limits of words spoken, but extends to include the movements of the body and its members, such as the face, hand, eye, hearing, touch, taste, sensation and the public body.
The human movements represented by polarization, frowns, tattoos, and movements are all auxiliary tools that reach meanings and affect others greatly.
Perhaps their importance is also in their ability to translate what is going on in the soul, and to show it to the outside body members, without the control of the human in many cases, it is thus an important factor in the process of human communication.
The purpose of this study is to show the senses of the senses in the
The training of great importance in the play, in building optic and intellectual broadcast codes tags, and then comes after the recipient at the reception of such codes and decoded tags, and is the rhythm, the color of the most important elements of configuration, consistent with other elements, Kaltmathl, and focus, and harmony, and dissonance
The researcher wanted to make an attempt to identify the foundations of social solidarity, to strengthen the bonds of brotherhood among society, and spread the causes of compassion in the hearts of its members.
The researcher has taken a short course in the hearts of the beloved to hearts.
JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space
... Show MoreBackground: War represents a major human crisis; it destroys communities and results in ingrained consequences for public health and well-being
Objective: We set this study to shed light on the public health status in Iraq after the successive wars, sanctions, sectarian conflicts, and terrorism, in light of certain health indicators.
Design: The primary source of data for this analysis comes from the Iraqi Ministry of Health, and The World Health Organization disease surveillance.
Results: Most of the morbidity indicators are high, even those that are relatively declining recently, are still higher than those repor
... Show MoreA colorectal polyp (CRP) is a growth on the lining of the colon or rectum. The incidence of CRPs is rapidly increasing with age. They are most often benign. The rectum is the most commonly affected site.
To determine the incidence, clinical presentation, and histopathologic types of CRP in Iraqi patients.
It is a cross-sectional screening study conducted in the medical c