At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreOtitis media with effusion (OME) is the long-term deposition of mucus in the middle ear cleft. It is the leading cause of childhood hearing loss and a common childhood infection. It can impair communication and life quality. OME's direct and indirect costs are also crucial. Improving OME care is crucial. This study examines intranasal mometasone's efficacy in treating otitis media with effusion. A clinical trial study was conducted during a period from January 2021 to June 2022. It included 80 patients suffering from otitis media with effusion bilaterally (160 ears) who had an intact tympanic membrane and tympanometry type B. These patients were included only if they had a hearing change or loss noted by the parents or by the patien
... Show MoreIn the recent years, remote sensing applications have a great interest because it's offers many advantages, benefits and possibilities for the applications that using this concept, satellite it's one must important applications for remote sensing, it's provide us with multispectral images allow as study many problems like changing in ecological cover or biodiversity for earth surfers, and illustrated biological diversity of the studied areas by the presentation of the different areas of the scene taken depending on the length of the characteristic wave, Thresholding it's a common used operation for image segmentation, it's seek to extract a monochrome image from gray image by segment this image to two region (for
... Show MoreMedicine is one of the fields where the advancement of computer science is making significant progress. Some diseases require an immediate diagnosis in order to improve patient outcomes. The usage of computers in medicine improves precision and accelerates data processing and diagnosis. In order to categorize biological images, hybrid machine learning, a combination of various deep learning approaches, was utilized, and a meta-heuristic algorithm was provided in this research. In addition, two different medical datasets were introduced, one covering the magnetic resonance imaging (MRI) of brain tumors and the other dealing with chest X-rays (CXRs) of COVID-19. These datasets were introduced to the combination network that contained deep lea
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive convers
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive
... Show MoreThe educational process depends on the means of conveying information from the teacher to the learner. Whenever appropriate, this means the learning process takes place better, faster, and with less effort, and the problem of research lies. The players lack learning in the meta-knowledge curriculum in basketball offensive skills than offensive skills. The aim of the research is to identify the effect of training exercises for educational numbers based on metacognitive skills in teaching some offensive skills with basketball. As for the research assignment, there are statistically significant differences between the results of the pre and post tests for the experimental group and in favor of the post tests. The experimental approach was used
... Show MoreAbstract: The development of highly sensitive sensors has become an efficient field of research. In this work, an ArF Excimer laser of 193 nm with a maximum pulse energy of 275 mJ, 15 ns pulse duration and a repetition rate of 1 Hz is utilized to form a Laser Induced Periodic Surface Structures (LIPSS) of three different morphologies (nanochains, contours, grooves) on surface of CR39 polymer at a fluence range above the ablation threshold (250 mJ/cm2). The laser ablated polymer surface is then Surface Enhanced Raman Scattering (SERS) activated by deposition of a gold layer of 30 nm thickness. The capability of the produced substrate for surface enhanced Raman scattering is evaluated through thiophenol as an analyte molecule. It is observ
... Show MoreAbstract: Reflection optical fibre Humidity sensor is presented in this work, which is based on no core fibre prepared by splicing a segment of no core fibre (NCF) at different lengths 1-6 cm with fixed diameter 125 µm and a single mode fibre (SMF). The range of humidity inside the chamber is controlled from 30% to 90% RH at temperature ~ 30 °С. The experimental result shows that the resonant wavelength dip shift decreases linearly with an increment of RH% and the sensitivity of the sensor increased linearly with an increasing in the length of NCF. However, a high sensitivity 716.07pm/RH% is obtained at length 5cm with good stability and reputability. Furthermore, the sensor is shif
... Show More