At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The childhood of the most important stages throughout the human and which have been more vulnerable to various factors surrounding it and with the scientific and cognitive development in all fields surfaced many psychological phenomena that play a large role in influencing children and their behavior trends is the susceptibility of the lure of psychological phenomena which plays a major role in the social attitudes of individuals it may not be predictable so that individuals vary in between them in terms of vulnerability Balasthoa You do this only _bl that the same individual at different influenced Balasthoa different depending on the positions and this was research to achieve its objectives and that are known:
_ alasthoa The childre
August Wilson’s major concern is to communicate the African American cultural awareness; to establish a counter-culture based on self-confidence and assertiveness. He advocates an encouraging attitude to elevate the African Americans’ spiritual consciousness and to teach them how to sublimate their aims in life. He aspires to win the everlasting battle against racial discrimination, oppression, injustice, and identity confusion. Sublimation, as a defense mechanism, will be Wilson’s new ammunition to re-read and to re-interpret the psychic constitution of his people, to help them get out of their self-imposed fences and this is the core of Wilson’s new culture. Sublimation is the process in which the psyche directs the negative drive
... Show MoreThis research aims to study and reveal the influence of Bauhaus principles in contemporary graphic design. The researcher determined the objective/spatial/temporal limit: Study of the Bauhaus influence in the design of the graphic poster in Germany in 2020. The theoretical framework in the first section dealt with (the emergence and factors of the emergence of the Bauhaus school and its characteristics), while the second topic dealt with (the intellectual, functional and aesthetic data of the Bauhaus School), after which the indicators that resulted from the theoretical framework were produced.
He mentioned four previous studies, one of them was discussed in detail. In the third chapter he defined the methodology, society, and sam
... Show MoreThis research is a pragmatic study of political blame in British and Iraqi Parliaments. It aims to unfold the similarities and/or differences in terms of the pragmatic and pragma-rhetorical strategies used by British and Iraqi politicians when they exchange blame in both offensive and defensive situations. A statistical analysis is conducted to quantitatively support the findings of the pragmatic analysis. The analyses conducted have yielded different results among blame is a process composed of two stages. Each stage is distinct for its pragmatic components and pragma-rhetorical strategies. British and Iraqi MPs at the blame stage tend to utilize impoliteness as their main strategy. However, British and Iraqi MPs perform differently at the
... Show MoreContext has occupied a distinguished place as far as the understanding of the texts and deducting the rules from them or analyzing them. The context was considered as one of the important presumptions as far arriving at the desired meanings is concerned. The word is worthless and the meaning is not known unless we know the context in which it came. The context in its two types the lingual and non-lingual types. It is the best for knowing the intended meaning of the Quranic verses to know the real meaning.
The present study was designed to evaluate the immunological status in a sample of Iraqi males with primary infertility and them age range18-55 years, who were attending the Centre of Infertility and in vitro Fertilization (Kamal Al-Samaraie Hospital, Baghdad) during the period December 2008 – April 2009. They were divided into three groups; 40 patients with anti-sperm antibodies (ASA), 20 patients with Asthenozoospermia (AST) and 20 patients with azoospermia (AZO). In adition to20 fertile males was as control group. The parameters of evaluations were standard seminal fluid analysis, anti-sperm antibodies and anti-mitochondrial antibodies in serum, Therefore, two types of samples were collected from each subject; seminal fluid and blood.
... Show MoreOpenStreetMap (OSM) is the world’s biggest publicly licensed geographic data collection. Because OSM is rapidly being used in a wide range of applications, researchers have focused their efforts on determining its quality. The OSM buildings data quality is still ambiguous, due to the limitations, and a few researchers have evaluated the OSM buildings data quality through difficulties where the authoritative data are not obtainable. The focus of this research is to analyze and assess the accuracy of OSM buildings including completeness, and positional accuracy methods. Two different study areas in Baghdad city-Iraq have been investigated: Al-Rasheed and Al-Karrada. The process of the (OSM) data evaluation involved identifying the correspon
... Show More
