At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Compensation is one of the most discussed topics in the arena of civil law that requires research About solutions to the damages that arise from the promotion of extremist ideas, which were imposed by the developments taking place in society and the increasing escalation of accidents and their increasing risks, which now threaten individuals and their property on a daily basis in large numbers, as the injured party always seeks to require quick compensation from the person responsible for the damage that satisfies his desires and removes the effects of the damage caused, The importance of compensation increases if the violation affects a person’s physical integrity or his right to life, which is the highest right recognized for humans in
... Show MoreIs no longer a football player looks to sport as a means of entertainment and physical development. But become see as part of The economic and is getting in return for the effort of، Through a contract with a club to organize the activity which is called a contract of professional, This contract is similar to the rest of the contracts in terms of problems and dispute that arise during the implementation or after it ends because of the nature of sports to such disputes and privacy being subject to special rules (regulations, national and international professional) required that subject to judicial bodies private mission confined settle sports disputes these entities and is affiliated unions legal committees and the court of arbitration for
... Show MoreMycobacterium tuberculosis resistance to rifampicin is mainly mediated through mutations in the rpoB gene. The effects of rpoB mutations are relieved by secondary mutations in rpoA or rpoC genes. This study aims to identify mutations in rpoB, rpoA, and rpoC genes of Mycobacterium tuberculosis isolates and clarify their contribution to rifampicin resistance. Seventy isolates were identified by acid-fast bacilli smear, Genexpert assay, and growth on Lowenstein Jensen medium. Drug susceptibility, testing was performed by the proportional method. DNA extraction, PCR, and sequencing were accomplished for the entire rpoA, rpoB, and
... Show MoreGestational Diabetes Mellitus (GDM) is the most common metabolic disorder that found during gestation and is define as hyperglycemia of variable severity with onset or first recognition during gestation that does not clearly characterize any form of the preexisting diabetes (American Diabetes Association [1]). It affects approximately 16.5% of pregnancies worldwide (Plows, et al.[2]). The placenta is an organ that connects the mother and her fetus during pregnancy (Gul, et al.[3]). In the placenta, glucose can be transformed into glycogen for storage by either glycogen synthase or using glycogenin as a prime. However, the function of glycogen deposition stays a matter of debate, it may be the source of fuel for placenta itself or the storag
... Show MoreThis research aims to clarify the principles governing the exploration and utilization of outer space, emphasizing the role of international law, particularly international criminal law, in addressing crimes committed beyond Earth whether aboard spacecraft, the International Space Station, or in outer space generally. It examines relevant international treaties governing outer space activities, evaluates their strengths and ambiguities, and highlights deficiencies in their provisions. Furthermore, the study analyzes traditional principles of state criminal jurisdiction territoriality, nationality, universality, and protection and assesses their applicability to offenses committed in outer space.
Rapid development has achieved in treating tumor to stop malignant cell growth and metastasis in the past decade. Numerous researches have emerged to increase potency and efficacy with novel methods for drug delivery. The main objective of this literature review was to illustrate the impact of current new targeting methods to other previous delivering systems to select the most appropriate method in cancer therapy. This review first gave a brief summary of cancer structure and highlighted the main roles of targeting systems. Different types of delivering systems have been addressed in this literature review with focusing on the latest carrier derived from malarial protein. The remarkable advantages and main limitations of the later
... Show MoreShifting Sand of English in Iraq language Policy and Planning
<div><p><em>This study investigates the use of the speech act of request by </em><em>Iraqi EFL (English as a foreign language) learners </em><em>in student-professor e-mail communication. It aims to examine request strategies and internal modifications in academic requests in e-mail. There has been little investigation of the issue of an academic request made by Arab EFL learners to a higher status person via an authentic data. Thus, this study intends to provide more investigation of the strategies and internal modifiers that are produced by Iraqi EFL learners when they interact with their professors via e-mail. However, this study adapts the CCSARP (cross-cultural speech act realization pr
... Show MoreMachine Learning (ML) algorithms are increasingly being utilized in the medical field to manage and diagnose diseases, leading to improved patient treatment and disease management. Several recent studies have found that Covid-19 patients have a higher incidence of blood clots, and understanding the pathological pathways that lead to blood clot formation (thrombogenesis) is critical. Current methods of reporting thrombogenesis-related fluid dynamic metrics for patient-specific anatomies are based on computational fluid dynamics (CFD) analysis, which can take weeks to months for a single patient. In this paper, we propose a ML-based method for rapid thrombogenesis prediction in the carotid artery of Covid-19 patients. Our proposed system aims
... Show MoreThis study investigated three aims for the extent of effectiveness of the two systems in educational development of educators. To achieve this, statistical analysis was performed between the two groups that consisted of (26) participants of the electronic teaching method and (38) participants who underwent teaching by the conventional electronic lecture. The results indicated the effectiveness of the “electronic teaching method” and the “electronic lecture method” for learning of the participants in educational development. Also, it indicated the level of equivalence from the aspect of effectiveness of the two methods and at a confidence level of (0.05). This study reached several conclusions, recommendations, and suggestio
... Show More