At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The research aims to demonstrate the impact of TDABC as a strategic technology compatible with the rapid developments and changes in the contemporary business environment) on pricing decisions. As TDABC provides a new philosophy in the process of allocating indirect costs through time directives of resources and activities to the goal of cost, identifying unused energy and associated costs, which provides the management of economic units with financial and non-financial information that helps them in the complex and dangerous decision-making process. Of pricing decisions. To achieve better pricing decisions in light of the endeavor to maintain customers in a highly competitive environment and a variety of alternatives, the resear
... Show Morethis research seeks to shed light on the study of the impact of Putinism on the Russian-Ukrainian war that broke out in early 2022, by studying the contents of the speeches of Russian President Vladimir Putin before the start of the war. This research uses the structural approach in analyzing the components of the Russian political regime. The research tools used in this research include case studies, content analysis of Russian speeches, and personal meetings of researchers and specialists in Russian affairs. It sums up a number of important conclusions, most notably are : 1) Putinism is a totalitarian regime that includes the political doctrine during the era of Russian President Vladimir Putin. 2) Duginism represents the totality of t
... Show MoreOrganizations adopt a number of procedures and instructions in their field of activities in order to aid their resources development and energies to serve their entrepreneurial orientations. This calls for preparing a range of mechanisms to mitigate the strictness and complexity of procedures. The ambiguity and severe complexity of procedures means acknowledging the loss in energy and this in turn impedes the hopes while in the same time weakens the enthusiasm in these organizations and an impedes the possibility to achieve continues innovation, thereby losing opportunities to the level of surrender to the risks and assuming them to be unconquered obstacles.
There
... Show MoreSeveral studies have indicated an unprecedented increase in the number of Arab youth who watch music videos. It is also a custom in Arab countries to broadcast songs at their happy parties such as weddings, engagements and birthdays. We see that guests and party owners interact by dancing and singing with the songs, while the viewership rates of Arab music videos have reached millions on YouTube. The researcher decided to study the image of women through the lyrics of these songs, due to their importance in shaping the image of women in the minds of young people and shaping the (self-image) of young women. Twenty songs were selected from the most watched songs on YouTube for the year 2024, and it was found that the negative qualities of t
... Show MoreThe aim of this research is to introduce agricultural insurance, to define financing in the form of salam and the role of agricultural insurance in the prevention of risks to agricultural finance operations in the form of salam by verifying the hypotheses through which to reach the results, including the imposition of risks for agricultural finance in the form of salam, The study of agricultural finance in the form of salm, the deductive approach to the development of the problem of research and hypotheses, and the inductive method to extrapolate the results through analysis and brother The researcher concluded that agricultural insurance works to bridge the risks facing agricultural finance in the form of the ladder in cases of
... Show MoreIntroduction: We aimed to assess the impact of adhesive and wires types on the tensile bond strength of fixed lingual retainers. Methods: A total of 160 intact bovine teeth were collected, cleaned, stored in 25% sodium hypochlorite, and randomly assigned to two groups based on the adhesive type: a two-step adhesive and a one-step adhesive. Each group was further divided into four subgroups based on the type of lingual retainer wire, which included (A) 8-strand braided stainless steel wire, (B) three-strand titanium retainer wire, (C) stainless steel chain, and (D) fiber-reinforced retainer. A tensile bond strength test was conducted using a universal testing machine at a controlled speed of 10 mm/min. Result: The 8-strand braided stainles
... Show MoreWireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreDue to technological developments in the Iraqi banking sector, which is the use of electronic payment systems within the banking infrastructure. This has led to speed and accuracy in the completion of transactions, reduced costs, increased revenues and efficiency. This research examines the challenges and risks facing the Iraqi banking sector as a result of its use of electronic payment systems. And show its impact on the profitability of commercial banks. The research was based on the main hypothesis that there is a statistically significant moral impact relationship between electronic payment systems and the profitability of banks. Iraqi commercial banks were chosen as a research community, All Iraqi commercial banks that parti
... Show MoreBackground: Moyamoya disease (MMD) is a rare cerebrovascular disease characterized by bilateral stenosis starting at the supraclinoid internal carotid artery (ICA), with the development of a collateral network of vessels. It is an established cause of stroke in the pediatric age group. Despite its increasing prevalence in various parts of the world, it remains largely underrecognized in the Middle East, particularly in Iraq. This is the first case of MMD in an Iraqi patient undergoing surgery. Case description: A 12-year-old boy presents with a 3-months history of progressive behavioural changes. MRI revealed diffuse infarcts of different ages. MRA and CT angiography revealed extensive asymmetrical steno-occlusive changes of t
... Show More