At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
AN Salih, LO Hamza, Ann. For. Res, 2022 - Cited by 2
SummaryThe most important obstacles facing girls’ clubs in IraqLamia Hassan Al-Diwan - Fatima Abdel Maleh - Nahida Hamed Thank youResearch SummaryIn the introduction and the importance of the research: We talked about women entering endurance events and relying on the principle of more training will achieve better results in the future. Based on the concepts that call for the equality of men with women in all aspects of sporting and competitive activity and as a result of the decline in women’s participation in sports clubs that include men, we came to The idea of establishing clubs for Iraqi girls in 1992, with a club in every governorate, and the Iraqi National Olympic Committee adopted this idea, the goal of which is to develop
... Show MoreThe corrosion of low carbon steel boiler tubes in demi water had been investigated. The purpose of this investigation was to determine the change produced in corrosion behavior of the carbon steel as a result of the specific presence of chloride and copper ions in the water under different temperatures. For low carbon steel experiments, the temperature was taken in three levels (125, 175, and 215°C) under about 27 bar pressure and 1500 rpm in autoclave. Using weight loss technique, the corrosion rate ranges from (85 to 789 gmd) for low carbon steel boiler tubes.
The Mythical Reference in the Poetry of Nabil Yassin
Magnetic Resonance Imaging (MRI) uses magnetization and radio waves, rather than x-rays to make very detailed, cross- sectional pictures of the brain. In this work we are going to explain some procedures belongs contrast and brightness improvement which is very important in the improvement the image quality such as the manipulation with the image histogram. Its has been explained in this worked the histogram shrink i.e. reducing the size of the gray level gives a dim low contrast picture is produced, where, the histogram stretching of the gray level was distributed on a wide scale but there is no increase in the number of pixels in the bright region. The histogram equalization has also been discuss together with its effects of the improveme
... Show MoreRealizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized
... Show MoreSurveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion