At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThis research includes depositionof thin film of semiconductor, CdSe by vaccum evaporation on conductor polymers substrate to the poly aniline where, the polymer deposition on the glass substrats by polymerization oxidation tests polymeric films and studied the structural and optical properties through it,s IR and UV-Vis , XRD addition to thin film CdSe, on of the glass substrate and on the substrate of polymer poly-aniline and when XRD tests was observed to improve the properties of synthetic tests as well as the semiconductor Hall effect proved to improve the electrical properties significantly
The vortex rate sensor is a fluidic gyroscope with no moving parts and can be used in very difficult
conditions like radiation, high temperature and noise with minimum cost of manufacturing and
maintenance. A vortex rate sensor made of wood has been designed and manufactured to study
theoretically and experimentally its static performance .A rig has been built to carry out the study,
the test carried out with three different air flow rates (100, 150, and 200 l/min).The results show that
the relation between the differential pressure taken from the sensor pickoff points and the angular
velocity of the sensor was linear.The present work involved theoretical and experimental study of
vortex rate sensor static characteri
The vortex rate sensor is a fluidic gyroscope with no moving parts and can be used in very difficult conditions like radiation, high temperature and noise with minimum cost of manufacturing and maintenance. A vortex rate sensor made of wood has been designed and manufactured to study theoretically and experimentally its static performance .A rig has been built to carry out the study,
the test carried out with three different air flow rates (100, 150, and 200 l/min).The results show that the relation between the differential pressure taken from the sensor pickoff points and the angular velocity of the sensor was linear.The present work involved theoretical and experimental study of vortex rate sensor static characteristics .Vortex rat
Background: The Covid-19 pandemic changed the world; its most important achievement for education was changing the approach from traditional to virtual education. The present study aimed to investigate the role of virtual education networks on mental health of students including personality, beliefs, scientific, and cultural dimensions, in selected countries.Methods: This was an exploratory and applied study. According to the phenomenology strategy, theoretical saturation occurred after 24 semi-structured and targeted qualitative interviews with teachers from Iran, Iraq, Syria and Lebanon, in 2023. Quantitative data was collected through a researcher-made online questionnaire with 423 participants. Teachers with at least a Bachelor’s degr
... Show MoreThe research included an epidemiological study of cutaneous leishmaniasis in Baghdad for two years (2019 and 2020). Data were collected from the Iraqi Ministry of Health in Baghdad public health departments for Al-Karkh and Al-Rusafa districts. The results of the positive examinations for cutaneous leishmaniasis for the two years mentioned came with 54 infections in Al-Rusafa district and 80 infections in Al-Karkh district for the year 2019, while in 2020, the infections in Al-Rusafa district were 201 infections and 152 infections in Al-Karkh district. The data were divided in terms of gender into males and females, so the percentage for the year (2019) was 15% for males and 12% for females, and in (2020) 44% for males and 29% for female
... Show MoreA survey of fish species in the Iraqi marine waters was carried out for the period from November 2014 to March 2018. The list included 214 species representing 75 families.
The family Carangidae dominated the marine fishes in Iraq, which was represented by 24 species, followed by Haemulidae with 11 species, and then Serranidae and Sparidae with nine species for each, while 34 families contained a single species only.
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreThis paper presents a comparative study of two learning algorithms for the nonlinear PID neural trajectory tracking controller for mobile robot in order to follow a pre-defined path. As simple and fast tuning technique, genetic and particle swarm optimization algorithms are used to tune the nonlinear PID neural controller's parameters to find the best velocities control actions of the right wheel and left wheel for the real mobile robot. Polywog wavelet activation function is used in the structure of the nonlinear PID neural controller. Simulation results (Matlab) and experimental work (LabVIEW) show that the proposed nonlinear PID controller with PSO
learning algorithm is more effective and robust than genetic learning algorithm; thi
Abstract
This work involves studying the effect of adding some selective organic component mixture on corrosion behavior of pure Al and its alloys in condensed synthetic automotive solution (CSAS) at room temperature. This mixture indicates the increasing of octane number in previous study and in this study show the increasing in corrosion resistance through the decreasing in corrosion rate values.
Electrochemical measurements were carried out by potentiostat at 3 mV/sec to estimate the corrosion parameters using Tafel extrapolation method, in addition to cyclic polarization test to know the pitting susceptibility of materials in tested medium.
The cathodic Tafel slope
... Show More