At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Reservoir permeability plays a crucial role in characterizing reservoirs and predicting the present and future production of hydrocarbon reservoirs. Data logging is a good tool for assessing the entire oil well section's continuous permeability curve. Nuclear magnetic resonance logging measurements are minimally influenced by lithology and offer significant benefits in interpreting permeability. The Schlumberger-Doll-Research model utilizes nuclear magnetic resonance logging, which accurately estimates permeability values. The approach of this investigation is to apply artificial neural networks and core data to predict permeability in wells without a nuclear magnetic resonance log. The Schlumberger-Doll-Research permeability is use
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThis research display a selected sample of Regelson's texts, there were interrelations and interactions unfolded so as to show his creativity in the employment of religious texts. In the story "In the Youth of Moses", he inter-texted the episode of the Prophet Moses from the Torah, the Source of legislation, to signify a legislative issue needed by the community. As for the story of "Samson, One of the Falling", he originated the character of The Judge Samson by alluding to the Book of the Judges, which is the Book which reminded of the defeat and slavery of the Palestinians by a Jewish leader, as is related in Jewish religious texts. Further, and the story of "And Haman Said", he chose the story of the Queen Esther from the Book of Esth
... Show MoreThe development of a reversed phase high performance liquid chromatography fluorescence method for the determination of the mycotoxins fumonisin B1 and fumonisin B2 by using silica-based monolithic column is described. The samples were first extracted using acetonitrile:water (50:50, v/v) and purified by using a C18 solid phase extraction-based clean-up column. Then, pre-column derivatization for the analyte using ortho-phthaldialdehyde in the presence of 2-mercaptoethanol was carried out. The developed method involved optimization of mobile phase composition using methanol and phosphate buffer, injection volume, temperature and flow rate. The liquid chromatographic separation was performed using a reversed phase Chromolith® RP-18e column
... Show MoreAwsaj (Lycium barbarum) is a plant belong to family Solanaceae serves as a good source of bioactive compounds like phytosterols which have many important biological activity. Literature survey available so far revealed that there was no studies about Iraqi wild Awsaj phytosterols especially B-sitosterol, there for the objective of this study was to examine the efficiency of ultrasound assisted extraction (probe and bath) as compared to the conventional (Soxhlet) extraction method for extraction of phytosterols especially B-sitosterol from fruits, leaves, stems and roots of Iraqi wild Awsaj plant. This goal was achieved by comparing the extraction mass yield, also by a quick and easy approach for identification and quantification of bioac
... Show MoreBackground: The association between facial types and dental arches forms has considerable implications in orthodontic diagnosis and treatment planning. The aim was to establish the maxillary and mandibular dental arches width and length in skeletal and dental class II division 1 and class III malocclusion groups, find out the most frequent dental arch form and facial type and the association between them and to check the gender differences. Materials and Methods: Frontal and lateral facial photographs and maxillary and mandibular occlussal photographs for 90 iraqi subjects with age 18-25 years old (45 males and 45 females) divided equally into three groups, the 1st group with class II division 1malocclusion (overjet more than 3mm but less t
... Show MoreThe study aims to identify the degree of implementation of the coronavirus prevention standards (covid-19) in the kingdom of Saudi Arabia and compare it with the families of intellectual disabilities. The study population consisted of all families residing in the Kingdom of Saudi Arabia. To achieve the objectives of the research, the analytical descriptive approach was employed. The study sample consisted of (372) families, among them (84) families with intellectual disabilities, and (288) families without intellectual disabilities. They were chosen from the Saudi community according to what is available for collection in a simple random way, using the standard criteria for the prevention of coronavirus (Covid- 19) Prepared by the resear
... Show Moreيتعرض قانون الموازنة العامة الاتحادية للطعن بعدم الدستورية كغيره من القوانين، بل أن الطعن فيه يكاد يكون سنوياً حال نشره في الجريدة الرسمية ، وتوجه إليه المطاعن بعدم الدستورية إما عن إجراءات تشريعه أو لمضامينه المتعارضة مع الدستور نصاً أو روحاً ، ولكنّه إذا كانت مدة الطعن بعدم دستورية القوانين كافة متاحة دون قيد زمني محدد ولا تتطلب سوى إجراءات إقامة الدعوى العامة وأخصها قيام شرط المصلحة في حالة الدعوى ال
... Show MoreIn The Name of Allah Most Gracious Most Merciful
It is no secret to everyone that the endowment is an important nucleus for the prosperity of Islamic civilization, especially in the fields of education, health, economy, and defensive military actions that fall within the door of jihad, and so on. Al-Ashraf, Qom Al-Quds, Cairo, and other parts of the Islamic world. What we will see in the research.