At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Background: This study aims to assess the prevalence of malposed canines among students of College of Dentistry/ University of Baghdad and evaluate the relation between canine malposition and occlusal features.
Material and method: The prevalence of buccally malposed canines was estimated by intra-oral visual examination of 250 young adult subjects (106 males and 144 females), their ages were between 19-24 years.
Results: The prevalence of the mandibular malposed canine (12%) was higher than the maxillary buccally malposed canine (10%). Generally, malposed canines were found higher in f
... Show MoreThis article is devoted to the cognitive study of ironic metonymy in Russian and Arabic. Metonymy and irony have traditionally been seen as parallel linguistic phenomena. But their formation and interpretation are based on different cognitive mechanisms. At the formal and functional level, metonymy and irony have a number of significant differences. Metonymy is an artistic technique, the mechanism of which is based on obvious, easily traced connections between objects and phenomena of the surrounding world. Irony is a satirical technique or a rhetorical figure that is used to create a certain artistic image, aimed at forming the hidden meaning of the statement. A native speaker intuitively feels the difference between metonymy and i
... Show MoreDuring the syrvey on natural enemies of whiteflies in Iraq, the following. predators were recorded.
Road traffic accidents (RTAs) are events that suddenly, inadvertently and unexpectedly occur under unforeseen circumstances that involve at least one moving vehicle and result in one or more road users being killed or injured. Unfortunately, Iraqi governorates suffer from higher rates of traffic accident casualties compared with the rates of casualties from terrorist attacks; this situation reveals a serious and growing problem. Road traffic accidents are not easy to eradicate. However, their prevalence can be reduced to the barest minimum via periodic assessments of traffic accident characteristics and the most important aspects for road authorities to consider when designing and evaluating the performance of a road to improve traf
... Show MoreBackground: Carpal tunnel syndrome
(CTS) is the most common neuropathy of the
upper limb due to compression of the median
nerve at the wrist.
Objectives: to test the benefit of steroid
irrigation of the wound to alleviate the post
operative pain.
Methods: Forty patients had carpal tunnel
release were divided into two groups with and
without steroid irrigation.
Results: Forty patients 38 female and 2 male
with forty CTS had open surgical release were
studied for postoperative pain at the wrist area.
Group 1 (patients treated with surgery alone)
and group 2 (patients treated with surgery and
steroid).In group1, 11 patients (55%) had
persistent agonizing pain at the ulnar side of
the wrist
Background: Melatonin is the main hormone secreted by the pineal gland. This indole compound (N-acetyl-5-methoxytryptamine) is derived from serotonin after two biochemical steps. Melatonin has been implicated in some pharmacological effects including sedative/hypnotic, anticonvulsant activity and others. The aim of this study was to investigate the antinociceptive effect of different doses of melatonin administered i.p. to mice, and then, to find the dose- response line of melatonin in mice as analgesic agent.
Methods: The dose response effect of melatonin (10, 50, and 100mg/kg) were assessed against control using tail flick test in mice as a model of nociceptive pain. In this model, all doses of melatonin were given intraperitoneally
Back ground : Fever is a common medical problem in
children. parents have been shown unrealistic fears of
harmful effects of fever in their children. Resulting in
inappropriate management of fever in their children.
Objective: the objective of this study was to survey
parents about their knowledge andattitude concerning fever
in their children.
Methods : The study involved random selection of
parents who brought their febrile children to emergency
department or out-patient clinics of five teaching and non
teaching hospitals in Baghdad from first of October to end
of December 2002.
Parents of 400 febrile children were interviewed using a
standard questionnaire to obtain sociodemographic
informatio
Regulations of changes in Sharia policy
Variables include jurisprudential rulings that may be subject to change, alteration and interpretation, depending on the mujtahid’s view of the ruling, or changing it and switching to another view, and the variables are the crucial issues that befell the nation of Islam. It was not neglected by Islamic legislation, but rather the setting of controls that took into account in every incident the norms, interests and purposes.
Cognitive radio is observed as a new approach, which could be cope with the spectral limitations. This approach is designed to detect whether a particular segment of the radio spectrum is currently in use and to jump into the temporarily unused spectrum rapidly without interfering with the transmissions of other users. CR is the promising radio technology which aims to detect and utilize the temporally unused spectrum bands by sensing its radio environment in order to improve spectrum utilization. To enhance the sensing performance, cooperative spectrum sensing has been proposed. However, when the number of cognitive user tends to be very large, the bandwidth for reporting sensing results to the common receiver will be very huge. In this pa
... Show More