At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The study was conducted over the period of Oct 2018 to Apr 2019 and is aimed for the detection and estimation of four hazardous Volatile Organic Compounds VOC (benzene, toluene, ethylbenzene, and xylene) so-called (BTEX) in samples collected from the produced water in the Al-Ahdab oil field in Iraq also to track their availability in the important natural water sources around the field. These compounds pose a risk to human health as well as environment. To avoid the laborious and tiresome conventional extraction methods, water samples were collected and concentrated using solid-phase extraction technique (SPE) which is a robust and cost-effective method of sample extraction with minimal exposure and handling of solvents and then to be analy
... Show MoreBackground: EBV infection in tissue micro-environment is challenged by the precisely regulated survivaland apoptosis mechanisms. Abnormal bcl-2 proto-oncogene expression in colonic carcinomas allowsaccumulation and propagation of these genetically altered cells.Objective: To analyze the relevant concordance of BCL-2 gene , EBNA1 s and LMP-1-EBV expression inissues from a group of Iraqi patients with colonic adenocarcinomas.Patients and Methods: One hundred (100) tissue biopsies, belonged to (40) patients with colorectalcancers, (40) patients with benign colon tumors, and (20) apparently normal colorectal control tissues,were enrolled in this study. The detection of EBNA1 s and LMP-1-EBV as well as BCL-2 was done byimmunohistochemist
... Show MoreThe strategies of knowledge management have became the basis in the promotion of core competencies. Therefore gained an increasing prominence. This led the administrations of organizations to work to effectiveness of there strategies, which results to build there core competences through teamwork, empowerment and personal effectiveness of employees. From this arises research problem about the organizations leaders recognize extent of knowledge management strategies which that lead to core competence. In addition the research tray definition the relation and nature of affect between its variables. The research was carried on sample (72) managers from board of supreme audit in Iraq and used statistical tools and methods.
... Show MoreResearch includes evaluation of projects implemented and which entered into trial operation period in accordance with the evaluation criteria and of (cost, quality and time) to determine the size deviations gap for the sample of projects during the years of assessment (2011-2012-2013-2014) of each of the three evaluation criteria, and then followed by a calculation the size of the overall gap to the problem based on the research problem to determine deviations from the specific implementation of each project by answering several questions to answer turns out the reasons for these deviations occur.
The importance of research Focus on the evaluation of received projects from contractors executing the projec
... Show MoreThe factorial analysis method consider a advanced statistical way concern in different ways like physical education field and the purpose to analyze the results that we want to test it or measure or for knowing the dimensions of some correlations between common variables that formed the phenomenon in less number of factors that effect on explanation , so we must depend use the self consistent that achieved for reaching that basic request. The goal of this search that depending on techntion of self consistent degree guessing for choosing perfect way from different methods for (orthogonal & oblique) kinds in physical education factor studies and we select some of references for ( master & doctoral) and also the scientific magazine and confere
... Show MoreAllosteric inhibition of EGFR tyrosine kinase (TK) is currently among the most attractive approaches for designing and developing anti-cancer drugs to avoid chemoresistance exhibited by clinically approved ATP-competitive inhibitors. The current work aimed to synthesize new biphenyl-containing derivatives that were predicted to act as EGFR TK allosteric site inhibitors based on molecular docking studies.
A new series of 4'-hydroxybiphenyl-4-carboxylic acid derivatives, including hydrazine-1-carbothioamide (S3-S6) and 1,2,4-triazole (S7-S10) derivatives, were synthesized and characterized using IR, 1HNMR, 13CNMR
The object of this research is to determine the effect in the differences of the correlation pattern of the micro blogging on the educational attainment of computer science curriculum for 12th grade students. I will try to test the best suited correlation and I might use the demo curriculum as well to achieve its objectives , The research method that will be used in this research is the quantitative method where we will use a sample of 60 students divided into two groups ( correlate the micro blogging - adopted the sequence pattern of relating the micro blogging) As a result, we found out that there are quantitative differences among the two groups' median , The differences goes back to the main effect of the correlation pattern of the m
... Show MoreThis study presents a mathematical model describing the interaction of gut bacteria in the participation of probiotics and antibiotics, assuming that some good bacteria become harmful through mutations due to antibiotic exposure. The qualitative analysis exposes twelve equilibrium points, such as a good-bacteria equilibrium, a bad-bacteria equilibrium, and a coexisting endemic equilibrium in which both bacteria exist while being exposed to antibiotics. The theory of the Sotomayor theorem is applied to study the local bifurcation around all possible equilibrium points. It’s noticed that the transcritical and saddle-node bifurcation could occur near some of the system’s equilibrium points, while pitchfork bifurcation cannot be accrued at
... Show MoreThe current research aims to answer the following questions: what is the substance of democracy? What is the content of a democratic society? What is the role of university professor in the democratic development of the student university in light of the new Iraqi society? In order to achieve the goals of the research, the researcher developed an a questionnaire based on literature, Iraq's draft constitution in 2005, and his experience of the field of teaching human rights and public freedoms and the teaching of democracy. It was applied to a sample of faculty members in Department of Education and Psychology / College of Education / University Baghdad for the year 20014 were obtained their answers were then processed statistically. Henc
... Show More