Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sat Jun 01 2019
Journal Name
2019 International Symposium On Networks, Computers And Communications (isncc)
An Interference Mitigation Scheme for Millimetre Wave Heterogeneous Cloud Radio Access Network with Dynamic RRH Clustering
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
Sarah Orne Jewett As a Precursor of Ecoconscious Children Fiction: “A White heron” As an Example
...Show More Authors

Nearly a century and a half has passed since Sarah Orne Jewett published her much anthologized short story “A White Heron” (1886), but commentators on the tale missed one of the most important points in the text. It is the story’s similarity to the traditional Euro-centric fairy tale of “Little Red Riding Hood”. As an author, writing at the end of the ninetieth century, a time that witnessed the demise of the Romantic movement in America and the beginning of the age of Realism, Jewett did not romanticize her characters, despite the idyllic landscape in which “A White Heron” is set. Her story can be analyzed as a text that aims at disseminating ecological awareness among her young readers. This study focuses on Jewett

... Show More
View Publication
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Pharmaceutical Sciences And Research
Farnesoid X receptor is an exciting new perspective target for treatment of diverse pathological disorders: Review
...Show More Authors

Scopus (11)
Scopus
Publication Date
Sun Jun 23 2019
Journal Name
American Rock Mechanics Association
Using an Analytical Model to Predict Collapse Volume During Drilling: A Case Study from Southern Iraq
...Show More Authors

Zubair Formation is one of the richest petroleum systems in Southern Iraq. This formation is composed mainly of sandstones interbedded with shale sequences, with minor streaks of limestone and siltstone. Borehole collapse is one of the most critical challenges that continuously appear in drilling and production operations. Problems associated with borehole collapse, such as tight hole while tripping, stuck pipe and logging tools, hole enlargement, poor log quality, and poor primary cement jobs, are the cause of the majority of the nonproductive time (NPT) in the Zubair reservoir developments. Several studies released models predicting the onset of borehole collapse and the amount of enlargement of the wellbore cross-section. However, assump

... Show More
View Publication
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science (ijeecs)
A new smart approach of an efficient energy consumption management by using a machine-learning technique
...Show More Authors

Many consumers of electric power have excesses in their electric power consumptions that exceed the permissible limit by the electrical power distribution stations, and then we proposed a validation approach that works intelligently by applying machine learning (ML) technology to teach electrical consumers how to properly consume without wasting energy expended. The validation approach is one of a large combination of intelligent processes related to energy consumption which is called the efficient energy consumption management (EECM) approaches, and it connected with the internet of things (IoT) technology to be linked to Google Firebase Cloud where a utility center used to check whether the consumption of the efficient energy is s

... Show More
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
The 53rd U.s. Rock Mechanics/geomechanics Symposium
Using an analytical model to predict collapse volume during drilling: A case study from southern Iraq
...Show More Authors

Scopus (7)
Scopus
Publication Date
Thu Sep 09 2021
Journal Name
Turkish Journal Of Physiotherapy And Rehabilitation,
The Violation of Religious Human Rights: A sample Analysis of an Offensive Image of Islamic Concept
...Show More Authors

The purpose of this paper is to investigate Religious Human Rights Violations. Religious liberty is essential for everyone, everywhere. Because religion is significant to everyone, everywhere. Humans are religious by nature. Our nature drives us to seek answers to deep questions about ultimate things. We cannot live a fully human life unless we are free to seek those answers and live according to the truths we discover. In this study, the researcher used Marsh and White model for analysis A sample of an offensive image of an Islamic concept from the book "Mohammad believes it or else." this book is a comic book written by pseudonym Abdullah Aziz and published by Crescent Moon Publishing company. The book is marked with anti- Mohammad, preju

... Show More
Preview PDF
Publication Date
Wed Oct 18 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program upon Nurses’ Knowledge about Complications Reduction at the Peritoneal Dialysis Units
...Show More Authors

Objectives: The study aims at identifying the nurses’ knowledge about peritoneal dialysis complications, to
construct an education program for nurses in peritoneal dialysis units, to determine the effectiveness of the
education program upon the nurses' knowledge about complications of peritoneal dialysis, and to identify the
relationship between the nurses’ knowledge and their demographic characteristics of level of education and
years of experience.
Methodology: A quasi-experimentai study was carried out at the peritoneal dialysis units of Baghdad teaching
hospitals, from April 2004 to April 2006.
٨ purposive sample of (50) nurse was selected from Baghdad teaching hospitals. These nurses working at the
perit

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
An Investigation of the Relationship between Writing Achievement and Writing Strategy Use by Secondary School Students
...Show More Authors

Basically, this study aims to identify the extent to which Iraqi secondary school students use writing strategies and how proficiency level and students gender could affect writing strategy use. The study also examines the relationship between writing achievement and writing strategy use among Iraqi secondary school students. For this purpose, 140 Iraqi secondary school students were selected randomly from six different schools. Petric and Czarl’s questionnaire (2003) was adopted in the study as an instrument to collect the needed data. A software of SPSS used to analyze the collected data. The findings revealed that secondary school students appeared as low users of writing strategies; low proficient students do not show a sta

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
Assessment of Observed Building Structure Setback of Shops along an Arterial Road and Noise Intrusion Level
...Show More Authors

Roads irrespective of the type have specific standard horizontal distance measured at 90 degrees from a lot boundary to a development known as a setback. Non-observance of the recommended setbacks accommodated in any urban center’s master plan creates noise hazard to the public health and safety as the movement of vehicular traffic is not without the attendant noise. This study assessed noise intrusion level in shops along a section of Ibadan-Abeokuta road with due consideration to compliance with the recommended building structure setback. Analysis of noise descriptors evaluated in this study gave A-weighted equivalent sound pressure level average of 91.3 dBA, the daytime average sound level (LD) 92.27 dBA,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref