At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreAspect categorisation and its utmost importance in the eld of Aspectbased Sentiment Analysis (ABSA) has encouraged researchers to improve topic model performance for modelling the aspects into categories. In general, a majority of its current methods implement parametric models requiring a pre-determined number of topics beforehand. However, this is not e ciently undertaken with unannotated text data as they lack any class label. Therefore, the current work presented a novel non-parametric model drawing a number of topics based on the semantic association present between opinion-targets (i.e., aspects) and their respective expressed sentiments. The model incorporated the Semantic Association Rules (SAR) into the Hierarchical Dirichlet Proce
... Show MoreImmunization is one of the most cost-effective and successful public health applications. The results of immunization are difficult to see as the incidence of disease occurrence is low while adverse effects following the immunization are noticeable, particularly if the vaccine was given to apparently healthy person. High safety expectations of population regarding the vaccines so they are more prone to hesitancy regarding presence of even small risk of adverse events which may lead to loss of pub
... Show MoreFinding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved. In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)
... Show MoreThe aim of the research is to identify the effectiveness of the educational pillars strategy based on Vygotsky's theory in mathematical achievement and information processing of first-grade intermediate students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught traditionally and the other experi-mental taught according to the educational pillars strategy. The research sample consisted of (66) female students from the first intermediate grade, who were inten-tionally chosen after ensuring their equivalence, taking into account several factors, most notably chronological age and their level of mathematics, and they we
... Show MoreIn this work, an enhanced Photonic Crystal Fiber (PCF) based on Surface Plasmon Resonance (SPR) sensor using a sided polished structure for the detection of toxic ions Arsenic in water was designed and implemented. The SPR curve can be obtained by polishing the side of the PCF after coating the Au film on the side of the polished area, the SPR curve can be obtained. The proposed sensor has a clear SPR effect, according to the findings of the experiments. The estimated signal to Noise Ratio (SNR), sensitivity (S), resolution (R), and Figures of merit (FOM) are approaching; the SNR is 0.0125, S is 11.11 μm/RIU, the resolution is 1.8x〖10〗^(-4), and the FOM is 13.88 for Single-mode Fiber- Photonic Crystal Fiber- single mode Fiber (SMF-P
... Show MoreA simple setup of random number generator is proposed. The random number generation is based on the shot-noise fluctuations in a p-i-n photodiode. These fluctuations that are defined as shot noise are based on a stationary random process whose statistical properties reflect Poisson statistics associated with photon streams. It has its origin in the quantum nature of light and it is related to vacuum fluctuations. Two photodiodes were used and their shot noise fluctuations were subtracted. The difference was applied to a comparator to obtain the random sequence.
Carbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h
... Show MoreUrban Development refers to many topics such as: increased population density, city size, and individual’s production, distribution of technology and the growth of commercial, industrial and service professions. Such development is linked to the coordination of social and cultural trends in order to achieve social progress and economical prosperity. Knowledge as a topic now is known as intellectual capital wich led to upgrae the concept of urban development to be extended into many fields of knowledge, for example, cultural, social and human development to move the level of community culture into a new better standard.
The research adopted the urban transformation based on knowledge as an important factor in gr
... Show More