At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Introduction:
Many business owners suffer major financial problems during periods of financial stagnation, the decline of markets and businesses, or under the impact of financial shocks for certain reasons that result in large debts and the consequent financial and legal obligations. This is the beginning of a long and endless path of suffering and the search for a safe exit. It is even worse for financial institutions to facilitate financial solutions that rely on lending as a solution to their financial problem. Debt and its consequences increase, and the problem deepens and becomes complicated until things become entangled and the escape or declaration of bank
... Show MoreWe presented here a 65years old lady with an unusual presentation of a large epigastric hernia of twenty years duration .The swelling was occupying all the right hypochondrial region .The diagnosis was made on r^E^a-operative identification of the defect in the linea alba which wassutured after removal of the hernial sac and its contents .The postoperative course was uneventful and the patient remained with no complications or recurrence for more than two years follow up.
The Banking Supervision of the most important functions of the Central Bank of Iraq, which he intended to have a strong banking system and a sound and competitive, and exercised control over the banks by inspection bodies to ensure their compliance with the laws, regulations and orders and instructions and the safety of their financial positions.
The research was aimed to release the concept of banking inspection, compliance and problems and obstacles faced by the inspectors, and monitors compliance and down to make recommendations.
Has been reached on a set of theoretical and practical conclusions, including: -
1-confirmed the statistical analysis of the answers to the research sample the importance of the role o
... Show MoreThe conservatorship is a legal action to protect troubled banks from credit risk and bankruptcy risk that banks cannot hedge them .The Central Bank role has to protect the financial system from these risks by controlling and supervising. This research studied these risks and explained the role of The Central Bank. This research presented and analyzed the legal framework for supervision and the imposition of conservatorship bank to address the effects that have been achieved as a result of poor management and weak internal controls. Baraka Bank for Investment and Finance was a research sample to measure the financial ratios for the troubled bank, and analysis the results that led to put the conservatorship. The research depends on the hyp
... Show MoreThe research aims to identify decent work and its impact in enhancing job immersion. The questionnaire was adopted as a tool to analyze the sample responses of (81) workers to represent an estimated response rate of (88 per cent) out of the total population of (92) individuals. The research adopted descriptive-analytical approach, and reliability calculation, arithmetic means standard deviations, relative importance, and regression analysis adopted on SPSS v.25. The conclusion shows that there is a medium correlation between decent work and job immersion, and there is a low impact of decent work with its dimensions in job immersion; extract the most important acceptable components for job from the sample point of view about the o
... Show MoreThe aim of this research is to apply Throughput Accounting in improving the cost leadership strategy for the woven fabric department (polyester blended - polyester 150/1) in the Waist Textile and Knitting Factory. The problem of the research is that the research sample laboratory does not apply modern cost management methods represented in Throughput Accounting, as the Iraqi economic units suffer from their inability to compete in the labor market in light of the competitive environment. The Ministry of Interior improved the cost leadership strategy for the product of blended polyester and polyester fabrics 1/150. Through the research, a set of conclusions was reached, the most important of which are: Improving the cost lea
... Show MoreNA Nasir, H Amir, Faculty of medicine - Iraq, 2017 - Cited by 13