At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Achieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreBackground: Complete removal of filling material from the root canal is an essential requirement for endodontic retreatment. The purpose of the present study is to evaluate and compare the dissolving capabilities of various solvents (Xylene, Eugenate Desobturator, Eucalyptol, EDTA and Distilled water (as a control)) on four different types of sealer (Endofill, Apexit Plus, AH Plus and EndoSequence bioceramic sealer). Materials and method: Eighty samples of each sealer were prepared according to the manufacturers' instructions and then divided into ten groups (of 8 samples) for immersion in the respective solvents for 2 and 5 min immersion periods. Each sealer specimen was weighed to obtain its initial mass. The specimens were immersed in
... Show MoreThe organizations and institutions of the developed countries have given attention to the subject of the knowledge economy by using advanced technology in the function of tax examination because of the important and effective role in ensuring the accuracy of the tax accounting process procedures, But the General Commission of taxes is still using traditional methods in the field of tax examination which affects the performance of its work. This research aims to explain the level of effect on introducing advanced methods of Economics and knowledge represented by advanced communication technology in the field of practicing tax examination function in the General Commission of taxes, A questionnaire has been used as a mea
... Show MoreThe efficiency evaluation of the railway lines performance is done through a set of indicators and criteria, the most important are transport density, the productivity of enrollee, passenger vehicle production, the productivity of freight wagon, and the productivity of locomotives. This study includes an attempt to calculate the most important of these indicators which transport density index from productivity during the four indicators, using artificial neural network technology. Two neural networks software are used in this study, (Simulnet) and (Neuframe), the results of second program has been adopted. Training results and test to the neural network data used in the study, which are obtained from the international in
... Show MorePredicting permeability is a cornerstone of petroleum reservoir engineering, playing a vital role in optimizing hydrocarbon recovery strategies. This paper explores the application of neural networks to predict permeability in oil reservoirs, underscoring their growing importance in addressing traditional prediction challenges. Conventional techniques often struggle with the complexities of subsurface conditions, making innovative approaches essential. Neural networks, with their ability to uncover complicated patterns within large datasets, emerge as a powerful alternative. The Quanti-Elan model was used in this study to combine several well logs for mineral volumes, porosity and water saturation estimation. This model goes be
... Show More
The Ash'aris and their position on faith, An Ideological Study
Omed AbdulQader rasool
College of Islamic Sciences/Salahaddin University-Erbil
Abstract
The concept of faith is very complex, and there are a lot of talk about it among the major Islamic groups such as the Kharijites, the Mu'tazila, the Jahmiyya and others, because of its great importance, and the worldly and eschatological effects it entails according to the elements of faith such as recognition, ratification and action.
The researcher chose one sect, which is the
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show MoreObjective(s): This study aims at determining the effectiveness of an educational program on knowledge of high school students' knowledge about substance abuse and its health consequences, and to find out the association between students’ knowledge about substance abuse and its health consequences and their demographic data of age, socioeconomic status, and educational level of parents.
Methodology: A quasi-experimental study is conducted for the period of October 28th, 2019 to March 30th, 2020. The study sample included a nonprobability “purposive” sample of (124) male students (62) students for the control group and (62) students for the study group, aged (14-19) years who are selected from Al-Hikma High School for Boys in Kirk
Acidizing is one of the most used stimulation techniques in the petroleum industry. Several reports have been issued on the difficulties encountered during the stimulation operation of the Ahdeb oil field, particularly in the development of the Mishrif reservoir, including the following: (1) high injection pressures make it difficult to inject acid into the reservoir formation, and (2) only a few acid jobs have been effective in Ahdeb oil wells, while the bulk of the others has been unsuccessful. The significant failure rate of oil well stimulation in this deposit necessitates more investigations. Thus, we carried out this experimental study to systematically investigate the influence of acid treatment on the geomechanical properties of Mi4
... Show MoreObjectives: the study aims to findout the effectiveness of educational program concerning infection control guideline on nurses, and to find out the relationship between effectiveness of program and types of hospital unit, age, level of education, and years of experience of nurses. Methodology: A quasi-experimental design study was carried out in Baghdad teaching hospital in the wards, for the period of December, 20th 2013 to September, 30th of July 2014, The study samples is composed of (60) nurses who have been actually working in the medical ward, blood disease, psychiatric ward, and neurological war