At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The condition of Islam and Muslims and what their political, social, cultural and educational status, and even religious and faith status, has led to whoever feels his belonging to this great religion and that middle nation, to try as much as he can to fix what has been corrupted as much as he can, and perhaps in diagnosing illness and illness as It was said half the way to treatment, and from this standpoint I liked to occupy thought, work consideration and harness part of the youth’s life in order to reach what contributes to reforming the situation and the safety of generations, and this is only in seeking knowledge and learning it by following the guidance of the Messenger (r) and his companions ( y) Therefore, the subject of my re
... Show MoreThis research deals with deliberative intentionality in its two dimensions, deliberative intent, direct, and indirect deliberative intent, and deliberative intentionality assumed great importance to ancient and contemporary scholars. The text, relying on deliberative intent as a methodology concerned with the study of language in usage, and the research focuses on direct deliberative intent through (the intent of acceptability, the intent of the presumption, the intent of the informational, the intent of interaction), and the indirect deliberative intent through (the intentionality of the case, the intent of the metaphor, The intent of the communicative impulse, the intent of the allusion,), and these deliberative elements activate and c
... Show MoreLynn Nottage's Ruined, a Pulitzer Prize play, tackles the plight of women’s survival during the civil war in the Democratic Republic of Congo. The play is a loud scream for the whole world to view the physical violence of women and hear their traumatic memories, hoping that this attempt might save them from their disastrous lives resulting from the brutalities of civil war. In this play, women are portrayed beyond victims of the political and armed conflicts as they serve as a reflection of a serious issue that threatens the human race in general: the continuing dehumanization whereby women are considered minorities and the “others,” even within their own society. By applying a critical analysis technique, the current paper ai
... Show MoreThis research discusses the developmental role of the social worker in providing care for children at risk. The research is desicriptive in nature include both the theoretical and field aspects. The theoretical aspect focuses on the characteristics and requirements of these children and what forms and implications are exposed to them by society, what is the developmental role of the social worker in the rehabilitation of this group. As for the field aspect, the study sample took a (40) social workers who working in Aiwa institutions inside Baghdad. A questionnaire of (14) questions was used as tool to collect the needed data.
Competencies topic in general , and Administrative competencies in specific, are considered as important subject in the contemporary administrative literature in all countries as well as in public and privet Organizations. For this reason, we have need to study those competencies in many Iraqi Organizations.
Two Organizations wer chosen for this research one of them is the Institution of taxation, and the other is the General company of Electric the data and information related to the research have been collected by desined questioner which has been given to a sample of (50) persions divided eqully between the two maintioned organizations.
The results of the study had differences
... Show More
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show MoreHepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show MoreThe solar photocatalytic degradation of diuron, which is one of the herbicides, has been studied by a solar pilot plant in heterogeneous solar photocatalysis with titanium dioxide. The pilot plant was made up of compound parabolic collectors specially designed for solar photocatalytic applications. The influence of different variables such as, H2O2 initial concentration, TiO2 initial concentration, and diuron initial concentration with their relationship to the degradation efficiency were studied. Hydrogen peroxide (H2O2) found to increase the rate of diuron degradation. The best removal efficiency of heterogeneous solar photocatalytic TiO2 system was found to be 46.65 % and for heterogeneous solar photocatalytic TiO2/ H2O2 system was fo
... Show MoreBackground: Endometrial Cancer (EC) is the malignant tumor originating from endometrium cell (lining of the uterus). EC incidence and mortality have increased in recent years. Routinely used methods for EC diagnosis and treatment are histopathological tissue culture after surgery and postoperative radiotherapy, however there is still not enough efficient treatment for recurrence or progression of this disease. So, there is a critical need for further EC identification by new biological ways for the prognostic diagnosis of it. Objective: This study aimed to look for ways by which could help in diagnosis of EC before the hysterectomy. Materials and Methods: 55 patients with EC and 57 healthy women were involved in this study (up to 45 years)
... Show More