At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
This article discusses some of the metaphorical use of language units. Here we will define the basic concepts and underline the causes of this phenomenon. Through research it is proven that through the application of names of some body parts achieves the variety of metaphorical meanings.
Linear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show MoreObjective: This study goal was to screen participants from different settings in Baghdad for depression using Beck Depression Inventory (BDI) scale and identify factors influencing the levels of depression. Methods: This cross-sectional study included a convenience sample of 313 people from four settings (teaching hospital, college of medicine, college of pharmacy, and high school) in Baghdad, Iraq. The participants were screened using paper survey relying on the BDI scale during spring 2018. Using multiple linear regression analysis, we measured the association between depression scores and six participant factors. Results: The overall prevalence of depression in our sample was 57.2%. Female participants had higher BDI
... Show MoreThe objective of this paper was to study the laser spot welding process of low carbon steel sheet. The investigations were based on analytical and finite element analyses. The analytical analysis was focused on a consistent set of equations representing interaction of the laser beam with materials. The numerical analysis based on 3-D finite element analysis of heat flow during laser spot welding taken into account the temperature dependence of the physical properties and latent heat of transformations using ANSYS code V.10.0 to simulate the laser welding process. The effect of laser operating parameters on the results of the temperature profile were studied in addition to the effect on thermal stresses and dimensions of the laser w
... Show MoreIdentity is an influential and flexible concept in social sciences and political studies. The basic sense of identity is looking for uniqueness. In one sense, it is a sign of identification with those we assume they are similar to us or at least in some significant ways they are so. Globalization, migration, modern technologies, media and political conflicts are argued to have a crucial effect on identity representation in terms of the political perspectives specifically in the United States of America. This paper endeavors to investigate how American politicians represent their identities in speeches delivered in different periods of time namely from 2015 to 2018 in terms of the pragmatic paradigm. Three randomly selected speeches by fa
... Show MoreThe present study was invistigated to show the bioaccumulation of some heavy metals (Cd, Co, Cr, Cu, Fe, Mn, Ni, Pb, Zn) by use Aquatic plant Myriophyllum verticilatum growing in Euphrates river between Spring 2004 to Winter 2005, and these heavy maters was studied in Dissolved and particulat phase of water and exchangable and residual phase of sediment. Heavy metals accumulated according the system water-sediment-aquatic plant, and recorded bioaccumulation factor 1.010, 0.005, 0.009, 0.011, 0.012, 0.010, 0.010, 0.010, 0.011, respectively.
The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstraction and examin
... Show Moreesearch Summary
Holidays and occasions in Islamic societies have a legal character and origin. Some of them are proven by the words and actions of the legislator, and some are within the scope of custom that is regulated by the honorable Sharia, and others are approved by scholars and people because of their connection, piety and charity. It has a kind of good.
One of the purposes of the noble Sharia is to glorify the honorable times associated with the blessed events, so that lessons and lessons may be recalled in them, and to activate the legitimate gifts in those events that develop in the individual, the family and the community the meanings of goodness and honor and all that is good and good. Accord
... Show More