At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The Fountain of poetry Canot be suddenly flow or flood from emptiness. but it is streams and motives drive it to move . Forward tat Calmness and latent in depth of poet ,and try to Chang it in to high wives , go in to details inside the seas of poetry ,to sail threw it on the ships of poetry in creative styel to reach to the point from imaginary meaning , so every poet has direction to competein poetry poetsin Lament of Imam Hussain, There versification of poetry didn’t come from emptiness , but there was clashes motive them threw Calling the personality of Imam Hussain to learn lesson in avery beautiful and greative styel ,to be the expression poem from many sides in the personality of Imam Hussain from that events and facts that happ
... Show MoreBackground: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date.Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magne
... Show MoreThis piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.
The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t
... Show MoreSpecialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give
... Show MoreThe present study was included the isolation of Keratinophilic fungi from water samples taken from 19 indoor public swimming pools in Baghdad during four season (summer ,fall ,spring ,and winter). Isolation period was September 2011and September 2012 . Samples were collected from different places in swimming pool . Sixteen keratinophilic fungal species, belonging to twenty –one genera were isolated using Surface Dilution Plating (SDP) and Hair Bait Technique (HBT) . Aspergillus genus was the most frequent and occurrence (19.84%), followed by Trichophyton (11.60%) and Fusarium (7.59% ) . The most common fungal infection occurred in summer season (42.16%) , and the most frequent month manifestation of species occurred in August
... Show MoreSound effects are considered to be a key element in children’s theatre, for it relays the context and amplifies its understandability, acceptability and its impact on the audience, so it’s a fundamental method in portraying the characters within the idea or the story, to produce the title and content with completeness in its relations that are associated with the rest of the fundamental elements represented in lighting, costumes, dialogue, decoration, etc. And this research included a set of subjects that are related to implementing the sound effects used in the Iraqi children’s theatre plays, chapter one included the problem and the need for studying this subject, as well as its importance and aim, and specifying the basic phrases
... Show MoreMatching between wind site characteristics and wind turbine characteristics for three selected sites in Iraq was carried out. Site-turbine matching for potential wind power application in Iraq has not yet been well reported on. Thus, in this study, five years’ wind speed data for sites located in Baghdad (33.34N, 44.40E), Nasiriyah (31.05N, 46.25E), and Basrah (30.50N, 47.78E) were collected. A full wind energy analysis based on the measured data, Weibull distribution function, and wind turbine characteristics was made. A code developed using MATLAB software was used to analyse the wind energy and wind turbines models. The primary objective was to achieve a standard wind turbine-site matching based on the capacity factor. Another matching
... Show MoreBackground: Potentially malignant oral disorders (PMODs) are common precursors of oral squamous cell carcinoma (OSCC). Neoangiogenesis and signalling are important intermediate biomarkers that may govern the progression of dysplastic mucosa into carcinoma. Aims: Evaluate the importance of CD34 and Wnt3 expression in PMODs and OSCCs in relation to their clinicopathological parameters. Settings and Design: Prospective cross-sectional study. Materials and Methods: Immunohistochemical staining for CD34 and Wnt3 was performed for 41 samples. These included 27 PMODs, six OSCCs and eight normal gingival and alveolar mucosa. Analysis of variance (ANOVA) and post-hoc tests were applied. P<0.05 was considered statistically significant. Results: CD34
... Show More