At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
After the use of trust in God, and after the completion of my research called (the legislative miracle in the light of Surat), which studies the miracle in general and then unique legislative miracle, which was the largest share of the research where I built my research on several topics dealt with in the first topic: definition of miracles language and terminology and address Also discussed the Quran and the challenge and miracles and the status of the Arabs in the eloquence and eloquence, and then the literature in the miracle and dealt with legislation based on the foundations of individual education, family building, community building, and the most important advantages of Islamic legislation and presented some examples of legislativ
... Show MoreZainab M. Al-Bahrani Department of Oral Diagnosis, College of Dentistry, University of Baghdad, Baghdad, Iraq.Corresponding author: Zainab M. Al-Bahra...
Deception is defined as a linguistic and non-linguistic behavior that is used in interaction in order to make the addressees believe what is believed to be false or lack evidence. McCornack (1992) classifies deception into four manipulative strategies (i.e., fabrication, distortion, equivocation and concealment), other scholars argue that deception encompasses the strategies of “fabrication (outright lying), equivocation (being vague and ambiguous), or concealment (with holding relevant information) Thus, the present study investigates the deception strategies and motives that are used by Johnny Depp and Amber Heard during their defamation trials. Qualitative and quantitative methods are employed when analyzing the data in question. Th
... Show MoreStudies were conducted from 1980 to 1989 to determine the insect pests infested animal museum collections in Iraq. Twelve species of Coleoptera were recovered, eleven belonged to the Dermestidae, and one to the Tenebrionidae. Of these Anthrenus coloratus Reitt. and Phradonoma nobile (Reitt.) were the most commonest and widely distributed species. Trogoderma bactrianum Zhant. and Orphilus niger (Rossi) were recorded here for the first time in Iraq.
In the current review, an updated list of dark beetle species (Coleoptera, Tenebrionidae) recorded in Iraq was given. The current paper is based on previous studies in the literature and contains all dark beetles referred to in Iraq, except for the species within the Pimelinae subfamily. The investigation of this review showed the presence of 89 species belonging to 34 genera within five subfamilies. This work included mentioning the basionyms and synonyms for genera and species with their global distribution, as well as, correcting the scientific names that were mentioned in the previous checklists.
It is obvious that the constitutional- political structures which has been emerged in Iraq after the occupation in 2003 frame worked by many sectarian, ethnic, tribal and political orientations, pushing forewords to escalating the contradictions between social- political powers, however, these changes unfortunately result not just destroy and taking apart the political regime and his authority, but the state and his institutions as well, although, did not stamped as wise and rational change for better future to new Iraq and its political, civil and military institutions. Finally, as quick as Iraq start to bisects to sectarian, ethnic and national components according to the new political – social components of Iraq. Indeed, what is req
... Show MoreBackground: Lung cancer is responsible for the most
cancer deaths in both men and women throughout the
world. Deaths from lung cancer (160,440 in 2004,
according to the National Cancer Institute) exceed the
number of deaths from four other major cancers combined
(breast, colon, pancreatic and prostate).
Objective: To assess the behavior and the approaches of
lung cancer in a sample of Iraqi patients.
Methods: This descriptive retrospective study was
performed using the records of 390 patients proved to have
lung cancer that had attending the Thoracic Surgery
Department of Surgical Specialties Hospital-Medical City
\Baghdad for the period from January, 1st
, 2001 to
December, 31st
,2002.
Res
Abstract Since unmethylated CpG motifs are more common in DNA from bacteria than vertebrates, and the unmethylated CpG motif has recently been reported to have stimulatory effects on lymphocytes, we speculated that bacterial DNA may induce inflammation in the urinary tract. To determine the role of bacterial DNA in lower UTI, we intraurethrally injected prokaryotic DNA (extracted from E. coli) in white mice and performed histopathological study for the kidneys and urinary bladders, 24 h after the exposure. The results showed infiltration of inflammatory cells, shrinkage of glomerulus and increase the capsular space, as well as edema formation in kidney tissues. Moreover, urinary bladder sections showed infiltration of inflammatory cells.
... Show More
