At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
One of the most important challenges facing project management at present time is to ensure project accomplishment in spite of the specific restrictions like the specific time the financial resources specialized to do the project ; which require an accurate consideration for time and cost . the modern village project (residential building aspect) is one of the great project that ministry of agriculture is trying to do Wasit governorate it is chosen as the work in this project is dilatory for that is being studied in term of some modern mathematical and scientific methods like critical path method (CPM)which is one of the project management and scheduling methods to know the time needed to accomplish residential building pro
... Show MoreIn this study, poly4-(nicotinamido)-4-oxo-2-butenoic acid (PNOE) was prepared by the electro polymerization of 4-(nicotinamido)-4-oxo-2-butenoic acid (NOE) monomer on a 316 stainless steel (St.St) which acts as an anticorrosion coating. Fourier transforms infrared (FTIR), atomic force microscopy (AFM), scanning electron microscopy (SEM), and cyclic voltammetry were used to diagnose the structure and the properties of the prepared polymer layer. The corrosion behavior of the uncoated and coated 316 St.St were evaluated by using an electro chemical polarization technique in 0.2 M hydrochloric acid solution as a corrosive medium at a temperature range of 293 to 323 K. Nano materials, such as nano ZnO and graphene were added in di
... Show MoreABSTRACT:
Objectives: The study aims to know the effectiveness of the educational program in the patient’s adherence to medication and diet and to know the relationship between the effectiveness of the education program and their demographic data related to the patient’s age, gender, marital status, education level, occupation, monthly income and residence.
Methodology: A quasi -experimental design study was performed on patient who attended to Gastroenterology and Hepatology Teaching Hospital, from March 2021 to September 2021. The non-probability sampling including 50 patients for case study and 30 patients for control group. The questionnaire consists of 3 parts, part one the socio
... Show MorePurpose: To determine the effect of information technology governance (ITG) under the control objectives for information and related technologies (COBIT) on financial performance is the objective of this study. Additionally, the article seeks to look into the relationships between the factors under consideration. Theoretical framework: Information technology and operational processes are evaluated and ensure their compliance with the instructions of the Central Bank of Iraq. Therefore, the research dealt with a conceptual framework by reviewing the literature on the importance of the COBIT framework in assessing financial performance. Design/methodology/approach: To investigate the effect of information technology; we the valu
... Show MoreA dispersive liquid-liquid microextraction combines with UV-V is spectrophotometry for the preconcentration and determination of Mefenamic acid in pharmaceutical preparation was developed and introduced. The proposed method is based on the formation of charge transfer complexation between mefenamic acid and chloranil as an n-electron donor and a p-acceptor, respectively to form a violet chromogen complex measured at 542 nm. The important parameters affecting the efficiency of DLLME were evaluated and optimized. Under the optimum conditions, the calibration graphs of standard and drug, were ranged 0.03-10 µg mL-1. The limits of detection, quantification and Sandell's sensitivity were calculated. Good recoveries of MAF Std. and drug at 0.05,
... Show MoreThe study aims to identify the impact of competency-based training in its dimensions (skills, cognitive abilities, attitudes, and attitudes) in improving the performance of employees (achievement, strategic thinking and problem solving) in Jordanian university hospitals.
The study based on analytical descriptive method. The study population consisted of the Jordanian University Hospitals, the University Hospital of Jordan and the King Abdullah Hospital, as applied study case. The sample of the study consists of all upper and middle administrative employees of these hospitals; questionnaire distributed all of them and the number of valid questionnaires for analysis were 182 questionnaire.
... Show More