At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Agent technology has a widespread usage in most of computerized systems. In this paper agent technology has been applied to monitor wear test for an aluminium silicon alloy which is used in automotive parts and gears of light loads. In addition to wear test monitoring، porosity effect on
wear resistance has been investigated. To get a controlled amount of porosity, the specimens have
been made by powder metallurgy process with various pressures (100, 200 and 600) MPa. The aim of
this investigation is a proactive step to avoid the failure occurrence by the porosity.
A dry wear tests have been achieved by subjecting three reciprocated loads (1000, 1500 and 2000)g
for three periods (10, 45 and 90)min. The weight difference a
The present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of
... Show MoreIt is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.
Introduction: This study was designed to examine the effects of addition of the combination of polymerized polymethyl methacrylate (PMMA) and zirconia (ZrO2) particles to heat cure PMMA resin on impact strength, surface hardness, and roughness. Methods: The 70% (w/w) of polymerized PMMA powder (particle size: 0.70mm) was mixed with 30% (w/w) of zirconia powder (ZrO2) (1mm) to produce PMMA-ZrO2 filler. Ninety acrylic specimens created were divided into three groups containing 0% wt (Control group), 2% wt, and 4% wt, PMMA-ZrO2 filler. Ten specimens were used for impact strength, surface hardness and roughness test, blindly. Data were analyzed via oneway ANOVA and the Tukey post hoc test using R 3.6.3. Results: There was statistically signific
... Show MoreThere is a set of economic factors that affect the rationalization of decisions on unexploited resources within the economic unit and here determines the problem of the search for the question of what economic factors cause the emergence of asymmetric costs, and aims to identify these factors in the costs of adjustment to resources, change in The size of the activity of the economic unit, the general trend of sales change in the previous period, and the economic level of the country. Rh measure the impact of these factors on economic unity, and taking into consideration the impact when formulating decisions.
The aim of the research is to show the extent of the impact of administrative coordination on municipal performance after the state’s tendency to implement administrative decentralization and transfer of powers (administrative, legal, financial, and technical) from the Federal Ministry (construction, housing, municipalities, and public works) to local governments (governorates), to meet local needs, And since the municipality is considered one of the local administrative institutions and most of its goal is to provide increased municipal services to citizens due to population growth and urban expansion of cities by coordinating their actions using their powers, and in order to address gaps i
... Show MoreThe present study was investigated the activity of aqueous extract from Cinnamomum cassia bark on the blood glucose levels in healthy and diabetic rats induced by Streptozotcin (STZ). In healthy rats the blood glucose levels were slightly decreased after six hoursof single oral administration with dose (25 mg/kg) of body wight, as well as four weeks after twice daily repeated oral administration of aqueous extract of Cinnamomum cassia bark. In streptozotocin induced diabetic rats we absorved high significant decreased (p<0.05) in blood glucose levels, after four weeks of oral administration of aqueous extract (25 mg /kg ).And blood glucose levels seems to be normal after the period of treatment .Glibenclamide used as standard drug to com
... Show MoreAbstract
The aim of this research is to concentrate on the of knowledge management activities, initial activities: (Acquisition, Selection, Generation, Assimilation, Emission) knowledge, and support activities: (Measurement, Control, Coordination, Leadership) that is manipulate and controlling in achieving knowledge management cases in organization, that’s is leads to knowledge chain model, then determining the level of membership for these activities to knowledge chain model in a sample of Iraqi organization pushed by knowledge (Universities). The research depends on check list for gaining the data required, theses check list designed by apparently in diagnosing research dimensions and measurem
... Show MoreThe research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show More