At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
A survey of fish species in the Iraqi marine waters was carried out for the period from November 2014 to March 2018. The list included 214 species representing 75 families.
The family Carangidae dominated the marine fishes in Iraq, which was represented by 24 species, followed by Haemulidae with 11 species, and then Serranidae and Sparidae with nine species for each, while 34 families contained a single species only.
Background: The Covid-19 pandemic changed the world; its most important achievement for education was changing the approach from traditional to virtual education. The present study aimed to investigate the role of virtual education networks on mental health of students including personality, beliefs, scientific, and cultural dimensions, in selected countries.Methods: This was an exploratory and applied study. According to the phenomenology strategy, theoretical saturation occurred after 24 semi-structured and targeted qualitative interviews with teachers from Iran, Iraq, Syria and Lebanon, in 2023. Quantitative data was collected through a researcher-made online questionnaire with 423 participants. Teachers with at least a Bachelor’s degr
... Show MoreFire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed
... Show MoreCloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe current research aims to diagnose the type and level of influence of social media, whose dimensions are represented by (attitudes towards social media marketing, knowledge and use of social media, influence on the Internet and social media, following up on social media) on customer behavior in its dimensions (attracting attention, raising Interest, desire creation, customer response), and the research sought to answer questions related to the research problem by testing the main hypotheses to explore correlations and influence between the two variables, and to achieve research hypothesis tests, the field study was used, as the research sample reached (135) individuals from the director and the assistant director And marketing personnel
... Show MoreThree hundred samples of washing water of vegetables were collected from women aged ( 15- 6o) years from different area in Baghdad governorate and its suburbs include two rural area ( Jaddria in Baghdad university and Al –Wagif in Rashdia) and two urbane area (Mansoure and Escan) . The samples were examined by precipitation method and then by staining method ( Lugols –Iodine stain) . The percentage of infection of intestinal parasites 36.3% include 15.3% for urban area and 57.3% in rural area and a significant difference was found between those groups . .The results showed also increased in the prevalence of parasitic infection in group age (15 -30) year .Also the results showed only 109 sample infected with eight specie
... Show MoreThe aim of this research is to know danger of radioactive isotopes
that are found in samples of drugs traded in Iraqi markets. The
samples are Iraqi Amoxicillin, English Amoxicillin, UAE
Amoxicillin, Indian Amoxicillin, Iraqi Paracetamol, English
Paracetamol, UAE Paracetamol and Indian Paracetamol. By high
purity germanium the activity of the following isotopes 40K, 214Pb,
228Ac and 137Cs is measured and the specific activity was used to
calculate the annual effective dose. Then the calculated annual
effective dose values are compared with the allowable annual
effective dose values of each part of digestive channel. This research
concluded that the measured annual effective dose values are not
dangerous.<
Vascular patterns were seen to be a probable identification characteristic of the biometric system. Since then, many studies have investigated and proposed different techniques which exploited this feature and used it for the identification and verification purposes. The conventional biometric features like the iris, fingerprints and face recognition have been thoroughly investigated, however, during the past few years, finger vein patterns have been recognized as a reliable biometric feature. This study discusses the application of the vein biometric system. Though the vein pattern can be a very appealing topic of research, there are many challenges in this field and some improvements need to be carried out. Here, the researchers reviewed
... Show More