At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:
There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group
... Show MoreThis study examines the vibrations produced by hydropower operations to improve embankment dam safety. This study consists of two parts: In the first part, ANSYS-CFX was used to generate a three-dimensional (3-D) finite volume (FV) model to simulate a vertical Francis turbine unit in the Mosul hydropower plant. The pressure pattern result of the turbine model was transformed into the dam body to show how the turbine unit's operation affects the dam's stability. The upstream reservoir conditions, various flow rates, and fully open inlet gates were considered. In the second part of this study, a 3-D FE Mosul dam model was simulated using an ANSYS program. The operational turbine model's water pressure pattern is conveyed t
... Show MoreThis research aims to investigate and improve multi-user free space optic systems (FSO) based on a hybrid subcarrier multiplexing spectral amplitude coding-optical code division multiple access (SCM-SAC-OCDMA) technique using MS code with a direct decoding technique. The performance is observed under different weather conditions including clear, rain, and haze conditions. The investigation includes analyzing the proposed system mathematically using MATLAB and OptiSystem software. The simulation is carried out using a laser diode. Furthermore, the performances of the MS code in terms of angles of bit rate, beam divergence and noise are evaluated based on bit error rate (BER), received
The problem of frequency estimation of a single sinusoid observed in colored noise is addressed. Our estimator is based on the operation of the sinusoidal digital phase-locked loop (SDPLL) which carries the frequency information in its phase error after the noisy sinusoid has been acquired by the SDPLL. We show by computer simulations that this frequency estimator beats the Cramer-Rao bound (CRB) on the frequency error variance for moderate and high SNRs when the colored noise has a general low-pass filtered (LPF) characteristic, thereby outperforming, in terms of frequency error variance, several existing techniques some of which are, in addition, computationally demanding. Moreover, the present approach generalizes on existing work tha
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show MoreWe are, today, facing a torrent of information, ideas, images and videos due to advances of communication technology and electronic publishing. In addition to the proliferation of social networking sites that allow individuals to use them and participate in their channels without any restrictions limiting their freedom in publishing. Due to these sites many terms have emerged like alternative media which use internet and its various techniques to serve its objectives notably the freedom of expression without restrictions. This research studies the phenomenon of interactive media i.e. alternative media through Facebook along with the freedom that makes it spreading in the society and the relation of individual freedom with social diversit
... Show MoreThe purpose of the study is to analyze the extent of the impact of liquidity as an independent variable on profitability as an intermediate variable and the value of banks listed in the Iraq Stock Exchange as a dependent variable, as the research problem is summarized by the fact that most banks focus on profitability as a phased goal without focusing on maximizing its value as a strategic goal by enhancing the wealth of owners and shareholders. On the long term, the research community is represented by the banks listed on the Iraq Stock Exchange, while the research sample was deliberately chosen, which included three private banks such as Baghdad Commercial Bank, the Iraqi Commercial Bank and the Iraqi Investment Bank, an
... Show MoreThis research is aimed at identifying the communicative habits and the impact of the content on the communicative process, especially the youth audience, which is one of the most important categories to which the advertisement is directed, as young people face life with passion and aspiration that make then responsive to all the influences used by the media in designing advertisements which use all the techniques and methocls to attract young people, such as relying on drama , artistic tricks, musical phrases and advertising slogans that respond to the desire of young people in entertainment.
The research aims to identify the reflection of television advertising and its impact on the development of the cognitive abilities of universi