At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
A composite section is made up of a concrete slab attached to a steel beam by means of shear connectors. Under positive and negative bending moment, part of the slab will act as a flange of the beam, resisting the longitudinal compression or tension force. When the spacing between girders becomes large, it is evident that the simple beam theory does not strictly apply because the longitudinal stress in the flange will vary with distance from the girder web, the flange being more highly stressed over the web than in the extremities. This phenomenon is termed "shear lag". In this paper, a nonlinear three-dimensional finite element analysis is employed to evaluate and determine the actual effective slab width of the composite steel-concrete
... Show MoreDiscriminant between groups is one of the common procedures because of its ability to analyze many practical phenomena, and there are several methods can be used for this purpose, such as linear and quadratic discriminant functions. recently, neural networks is used as a tool to distinguish between groups.
In this paper the simulation is used to compare neural networks and classical method for classify observations to group that is belong to, in case of some variables that don’t follow the normal distribution. we use the proportion of number of misclassification observations to the all observations as a criterion of comparison.
A field experiment was conducted during winter, 2015-16 with the objective to investigate the effect of bread wheat cultivars (Abu-Ghraib3, Ibaa99, and Alfeteh) and seed priming 100, 100, 150 mg L-1 of benzyl adenine, salicylic acid, gibberellic acid (GA3), respectively, ethanolic extract of Salix Sp., water extract of Glycyrrhiza glabra and distilled water (control) on grain growth rate (GGR), effective filling period (EFP) and accelerating of physiological maturity. Randomized complete block design with three replicates was applied. GA3×Ibaa99 surpassed others in grain yield (7.432 tonne ha-1) when gave the highest grain weight (45.13 mg grain-1) and GGR (1.5 mg grain-1 day-1) with the fastest time to start and end EFP (5 and 34 days), w
... Show MoreThe research deals with a very important topic, which is social security viewed in the context of criminal protection for state security and the challenges it faces after a decisive change in the methods of war. The research also presents a different division of the generations of wars. We limit ourselves to four of them based on the change in the strategic war objectives and not just the means of committing them. This is because these means are not suitable for describing the real changes in the patterns of wars and the goals that it seeks to achieve. The research stresses the importance of putting the concept of state security in its correct framework, which is part of social security, so that the interest of the political system and the
... Show MoreIn this research thin films from SnO2 semiconductor have been prepared by using chemical pyrolysis spray method from solution SnCl2.2H2O at 0.125M concentration on glass at substrate temperature (723K ).Annealing was preformed for prepared thin film at (823K) temperature. The structural and sensing properties of SnO2 thin films for CO2 gas was studied before and after annealing ,as well as we studied the effect temperature annealing on grain size for prepared thin films .
The research aims mainly to the role of the statement style costs on the basis of activity based on performance (PFABC) to reduce production cost and improve the competitive advantage of economic units and industrial under the modern business environment dominated by a lot of developments and changes rapidly, which necessitates taking them and criticize them to ensure survival and continuity. The research problem is the inability of traditional cost methods of providing useful information to the departments of units to take many administrative decisions, particularly decisions related to the product and calculating the costs of the quality of the sound and the availability of the need and the ability to replace methods capa
... Show MoreIn this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreVolunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these fun
... Show More