At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
It is an analytical study carried out at university of Basra using a sample included the dean ,assistants and managers of scientific dept. in the university for about(63)managers .The study aimed at discovering a model of crises management in the university.The researcher adopted the descriptive survey methodology.To achieve the objective of the study ,a questionnaire of (41)statements was developed covering five main variables like ,signal detection, prevention and preparedness, response, recovery and learning .The validity of the questionnaire was done by a group of referees .Its stability was determined by Cronbach,s Alfa .The questionnair,s stability coefficient was(0.
... Show MoreIn this paper, an approximate solution of nonlinear two points boundary variational problem is presented. Boubaker polynomials have been utilized to reduce these problems into quadratic programming problem. The convergence of this polynomial has been verified; also different numerical examples were given to show the applicability and validity of this method.
The global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut
... Show MoreMansuriya Gas field is an elongated anticlinal structure aligned from NW to SE, about 25 km long and 5-6 km wide. Jeribe formation is considered the main reservoir where it contains condensate fluid and has a uniform thickness of about 60 m. The reservoir is significantly over-pressured, (TPOC, 2014).
This research is about well logs analysis, which involves the determination of Archie petrophysical parameters, water saturation, porosity, permeability and lithology. The interpretations and cross plots are done using Interactive Petrophysics (IP) V3.5 software.
The rock parameters (a, m and n) values are important in determining the water saturation where (m) can be calcul
... Show MoreProject management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreAbstractThis study aimed to demonstrate the impact of human development on economic growth in Jordan during the period (1980-2014), Where some diagnoses tests were applied, the results of these tests concluded that the standard models used in the study were free of statistical problems, and hence ordinary least squares (OLS) standard has been used as a tool for analysis to get efficient and unbiased estimates to parameters according to the theory of Gauss Markov.
The results showed that there is a strong and positive impact of human development represented by the Human Development Index (HDI) on economic growth in Jordan represented by the average of real productivity of the Jordanian worker (
... Show MoreScheduling Timetables for courses in the big departments in the universities is a very hard problem and is often be solved by many previous works although results are partially optimal. This work implements the principle of an evolutionary algorithm by using genetic theories to solve the timetabling problem to get a random and full optimal timetable with the ability to generate a multi-solution timetable for each stage in the collage. The major idea is to generate course timetables automatically while discovering the area of constraints to get an optimal and flexible schedule with no redundancy through the change of a viable course timetable. The main contribution in this work is indicated by increasing the flexibility of generating opti
... Show MoreThe goal of this paper is to design a robust controller for controlling a pendulum
system. The control of nonlinear systems is a common problem that is facing the researchers in control systems design. The Sliding Mode Controller (SMC) is the best solution for controlling a nonlinear system. The classical SMC consists from two phases. The first phase is the reaching phase and the second is the sliding phase. The SMC suffers from the chattering phenomenon which is considered as a severe problem and undesirable property. It is a zigzag motion along the switching surface. In this paper, the chattering is reduced by using a saturation function instead of sign function. In spite of SMC is a good method for controlling a nonlinear system b