At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Objective(s): The present study aims at assessing the prevalence of smoking among health workers in Baghdad Teaching Hospital and to find out the effectiveness of instructional booklet concerning risk of smoking on health workers′ knowledge in hospital.
Methodology: A pre-experimental design study was conducted from 1st of October 2019 to 17th of March 2020. A non-probability sample consists of (500) participant (343 non-smokers and 157 smokers) from (1500) health workers in Baghdad Teaching Hospital, they included the physicians, nurses, pharmacists, physiotherapists, Laboratory Technicians, Medical Assistants. A questionnaire is constructed to evaluate the effectiveness of instructional booklet on health workers’ knowledge
The solvent free oxidation of benzyl alcohol was conducted employing Au and Pd supported catalysts, while utilizing hydrogen peroxide 35% (H2O2) as the oxidant, H2O2 is very cheap, mild, and an environment friendly reagent, which produced water as the only by-product. Various proportions of Au-Pd catalysts on carbon and titanium oxide activated as supports were synthesized through the use of sol immobilization catalyst synthesis technique. Characterization of the synthesized catalysts was performed using X-Ray Diffraction (XRD), Brunauer-Emmett-Teller (BET), Field Emission Scanning Electron Microscopy (FESEM), and Transmission Electron Microscopy (TEM). It was found that the synthesized Au-Pd/ activated carbon catalyst was benef
... Show MoreBackground: The new concepts and technologies continue to change the dynamics of endodontic practices in the world. Rapid and significant changes in techniques, instrument design, and the type of metals used to manufacture endodontic instruments which have been made during the last few years in an attempt to overcome canal preparation errors. The purpose of this study is to measure and compare canal transportation and centering ability of Self Adjusting File with two rotary nickel-titanium (Ni-Ti) systems, ProTaper and BioRaCe at different levels. Material and Methods: Forty five distal roots of mandibular first molars with moderate curvature were selected using Schneider method. Roots were divided randomly into 3 groups of 15 each and were
... Show MoreForeign body embolization is a rare but serious iatrogenic complication that might necessitate transcatheter or even surgical retrieval. A broken double-lumen catheter was snared using a goose neck snare kit. The procedure was successful, and the patient experienced no further complications.
A specific, sensitive and simple method was used for the determination of: vitamin B9 (Folic acid) in pure and pharmaceutical formulations using continuous flow injection analysis. The method is based on formation of ion pair compound between folic acid and ammonium molybdate in an aqueous medium to obtain a gray precipitate complex, using homemade; Ayah-6SX1-ST-2D solar cell CFI Analyzer. Optimum parameters was studied to increase the sensitivity for developed method. The linear range for the calibration graph was 0.01-0.6 mMol.L-1 of vitamin B9 and LOD was 131.994 ng/sample with correlation coefficient ( r ) of 0.9810, RSD% was lower than 0.1%, (n=9) for the determination of vitamin B9 at concentration (0.07and 0.5) mMol.L-1 respectiv
... Show MoreAbstract
This research aims to assess the practice of physical activities by people with intellectual disabilities and its challenges during the Coronavirus (COVID-19) pandemic from their families' point of view. The research sample consisted of (87) individuals from families with intellectual disabilities in the Makkah region. The sample was selected by the simple random method where the researcher used the descriptive analytical approach. A questionnaire of (32) items was used as the research tool to collect data. The findings of the study showed that the assessment level of practicing physical activities by people with intellectual disabilities was low. The public facilities dimension ranked first with a moder
... Show MoreIn Production and Operations Management the specialists have tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.
The research aims to develop a blu
... Show MoreThe issue of freedom is the most prominent and distinctive issue of Western thought, which it reached after a long struggle. The English thinker John Stuart Mill is considered the most prominent Western thinker who elaborated on the issue of freedom, until his ideas on the issue of freedom became the semi-final formula for issues of freedom in Western thought, which revolve in their entirety on The individual has complete freedom as long as it does not harm others, and this freedom is controlled by law.
And if the freedoms he offered were not considered an achievement in Western thought; Freedom in Islam is a central and fundamental issue, and the details of freedoms in Islam have not been accomplished by anyone, but rather came
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThis research explains to us the role of the Islamic religion in the issue of accuracy in speech and work, and how it is closely related to human production in his life, and Islam affirms that his idea is mainly reflected in his production, and how it affects the perception of the meaning of creativity. Therefore, our Islam affirmed the accuracy in every word or work we do to build a society in which people enjoy high quality in ethics and dedication in their work so that the Islamic system depends on humanity to preserve our rights on the other hand the research discusses the deliberate default and how it reflects on our production and how it makes it less good.