At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The pure ZnS and ZnS-Gr nanocomposite have been prepared
successfully by a novel method using chemical co-precipitation. Also
conductive polymer PPy nanotubes and ZnS-PPy nanocomposite
have been synthesized successfully by chemical route. The effect of
graphene on the characterization of ZnS has been investigated. X-ray
diffraction (XRD) study confirmed the formation of cubic and
hexagonal structure of ZnS-Gr. Dc-conductivity proves that ZnS and
ZnS-Gr have semiconductor behavior. The SEM proved that
formation of PPy nanotubes and the Gr nanosheet. The sensing
properties of ZnS-PPy/ZnS-Gr for NO2 gas was investigated as a
function of operating temperature and time under optimal condition.
The sensitivity,
The paper discusses the structural and optical properties of In2O3 and In2O3-SnO2 gas sensor thin films were deposited on glass and silicon substrates and grown by irradiation of assistant microwave on seeded layer nucleated using spin coating technique. The X-ray diffraction revealed a polycrystalline nature of the cubic structure. Atomic Force Microscopy (AFM) used for morphology analysis that shown the grain size of the prepared thin film is less than 100 nm, surface roughness and root mean square for In2O3 where increased after loading SnO2, this addition is a challenge in gas sensing application. Sensitivity of In2O3 thin film against NO2 toxic gas is 35% at 300oC. Sensing properties were improved after adding Tin Oxide (SnO2) to be mo
... Show MoreIn this work, porous silicon gas sensor hs been fabricated on n-type crystalline silicon (c-Si) wafers of (100) orientation denoted by n-PS using electrochemical etching (ECE) process at etching time 10 min and etching current density 40 mA/cm2. Deposition of the catalyst (Cu) is done by immersing porous silicon (PS) layer in solution consists of 3ml from (Cu) chloride with 4ml (HF) and 12ml (ethanol) and 1 ml (H2O2). The structural, morphological and gas sensing behavior of porous silicon has been studied. The formation of nanostructured silicon is confirmed by using X-ray diffraction (XRD) measurement as well as it shows the formation of an oxide silicon layer due to chemical reaction. Atomic force microscope for PS illustrates that the p
... Show MoreThere is a mutual relationship between the form of a text and its meaning so as separating these two or devaluating the role of one of them leads to the absence of the value therein. Thus, a translation is important as to how it relates the details of a text. That is, the text has special features which go beyond form, and these set out its distinctiveness. Here, we tackle Saleh al-Jafari's Arabic translation of "Rubbayat al-Khayyam" of Naysapour descriptively and analytically by depending on extracts from the original text. This translation is evaluated on the basis of Spanish critic Maria Carmen Valero Garces. Herein, we discuss the effectiveness of this theory in the criticism of literary texts. It has been concluded that al-Jaf
... Show MoreHuman Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThis research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreThis research takes up address the practical side by taking case studies for construction projects that include the various Iraqi governorates, as it includes conducting a field survey to identify the impact of parametric costs on construction projects and compare them with what was reached during the analysis and the extent of their validity and accuracy, as well as adopting the approach of personal interviews to know the reality of the state of construction projects. The results showed, after comparing field data and its measurement in construction projects for the sectors (public and private), the correlation between the expected and actual cost change was (97.8%), and this means that the data can be adopted in the re
... Show MoreUnconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria. Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core. Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More