At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Virtual platforms are online classes used in teaching and learning EFL that let both teachers and students connect, communicate and cooperate online in real time. Learners get access to educational possibilities at home easily. Virtual classes can be conducted using a variety of techniques, including video conferencing, Google Meet, Zoom, conversations, reactions, and screen sharing. Users can access these programs on a range of gadgets, including laptops, tablets, and smartphones. The COVID-19 coronavirus pandemic affected all educational institutions, including schools, colleges, and universities. Our Iraqi educational institutions have been switched to use virtual platforms in this pandemic, much as all other foreign institutions
... Show MoreThe study evaluated the recovery performance of any home herbs group as first aid in some emergency cases. The study involved 10 items of herbs (chamomile, black pepper, cloves, cinnamon, and anise) which used in acute cases such as cold, colic, inflammation of the intestine and tonsillitis, and (hibiscus, catnip, dried lime, cress seed, and ginger) were used for chronic cases such as hypertension, cardiovascular disease, and arthritis. The results showed the herbs had healing power and efficiency in the primary remedy for the above-mentioned diseases. The side effects, the contradictions, and the overdoses of these substances were discussed. It was concluded that home herbs could be used for treatment in emergency cases until moder
... Show MoreGaucher disease (GD), which is due to a deficiency in the lysosomal enzyme β-glucocerebrosidase, is a rare genetic disorder. It is characterized by a wide variety of clinical manifestations and severity of symptoms, making it difficult to manage. A cross-sectional hospital-based genetic study was undertaken with 32 pediatric patients. We recruited 21 males and 11 females diagnosed with GD, with a male-to-female ratio of 1.91:1. The mean age of the study population was 8.79 ± 4.37 years with an age range from 8 months to 17 years. We included patients on clinical evaluation from 2011 to 2019. An enzyme assay test was used to measure β-glucosidase enzyme activity in leukocytes and the GBA gene s
I have studied the relationship between blood groups in humans and disease Cutaneous injury for the first time in Iraq study showed the presence of a significant statistical relationship between them leather Bmsoy in hospitals in Baghdad and its suburbs
The appearance of Mixed Mode Oscillations (MMOs) and chaotic spiking in a Light Emitting Diode (LED) with optoelectronic feedback theoretically and experimentally have been reported. The transition between periodic and chaotic mixed-mode states has been investigated by varying feedback strength. In incoherent semiconductor chaotically spiking attractors with optoelectronic feedback have been observed to be the result of canard phenomena in three-dimensional phase space (incomplete homoclinic scenarios).
Reinforced concrete (RC) slabs strengthened with carbon fibre reinforced polymer (CFRP) and subjected to flexural actions may experience many types of failure, including FRP debonding, FRP rupture and concrete crushing. Of these different types of failure modes, FRP debonding stands out as the most predominant type of failure because of its dependence on the relatively weak bond interface between the soffit of the RC member and the FRP sheet attached to it. Many anchorage systems have been developed to enhance the performance of strengthened systems, one of which is the hybrid anchor, which combines the effects of patch anchors and spike anchors. Hybrid anchors have shown significant enhancement when used with RC members subjected to shear
... Show MoreThis study aims at finding out the sentimental smartness of the kindergarten children
and its relationship with some variables.
1- The level of the sentimental smartness of the kindergarten children.
2- Investigating the Zero hypothesis in that there are no significant statistical differences in
the sentimental smartness between the kindergarten children according to the sex variables
(males and females).
Some statistical tools have been used in order to arrive at the results that verify the
hypotheses of this study. The researcher uses (1) the distinctive power between two
distinctive groups; (2) the relationship between the item and the total degree (Pearson
correlation factor); and (3) Elfakronbach formula t
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show More