At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
This paper deals with testing defected model piles in the soil in order to study their behavior. In this respect, the results of model pile tests are discussed either geotechnically or structurally according to the type of failure. Two parameters were studied in order to evaluate the general behavior of defective piles. These parameters include the defect location and the defect type for floating and end bearing pile. The results of the experimental work indicated that the critical case for floating pile is seen to be when the defect of (5%) at the first third of the pile length at which the decrease in the bearing capacity is about (21%), while the decrease in the bearing capacity is found to be (14%) and (10%), when
... Show MoreThis paper is devoted to the discussion the relationships of connectedness between some types of graphs (resp. digraph) and Gm-closure spaces by using graph closure operators.
Precarity means the lack of social and economic networks; a considerable exposure to danger and harm. Minority groups are precariat for they lack rights and full citizenship. Precarity is related, states Judith Butler, with the individual’s performativity, and his ability to perform his gender role. Toni Morrison continually goes to past to retell the history of African Americans. The issues of race, gender and national identity are recurrent in her work. Reading her book Home (2012) evokes the idea of precarity and performativity since the two main characters, Frank and Cee are precarious characters that fail to perform their gender role properly, and eventually are exposed to hazard and harm. This research displays how African American
... Show MoreIslamic periodicals are defined as: publications issued periodically, and containing articles, research, or studies that convey Islamic thought and culture. Islamic periodicals have a prominent place among other types of sources of documentary and non-documentary Islamic information, because they are characterized by the speed of their issuance and the modernity and diversity of their Islamic information. This study aims to explain the reality of Islamic periodicals published in Iraq, graphically analyze their bibliographic characteristics and emphasize the importance of their issuance, as well as give a historical overview of the issuance and publication of Islamic periodicals in the Arab world and the world, while presenting examples of I
... Show MoreA new spectrophotometric method for the determination of allopurinol drug was investigated. The proposed method was based on the reaction of the intended drug with catechol and Fe(II) to form a blue soluble complex which was measured at λmax 580 nm. A graph of absorbance versus concentration shown that Beer’s law was obeyed over the concentration range of 2–10 μg ml–1 with molar absorptivity of 9.4 x 103 l mol–1 cm–1 and Sandell sensitivity of 1.4 x 10–2 μg cm–2. A recovery percentage of 100% with RSD of 1.0%–1.3% was obtained. The proposed method was applied successfully for the determination of allopurinol drug in tablets with a good accuracy and
Knowledge and awareness towards cryptosporidiosis were assessed in this study during the period from April 2009 till June 2011, among 188 person of both gender which were divided in different groups and sub groups as following Group 1: include 48 physician from different hospitals and primary health care centers in Baghdad this group were sub divided into 30 Specialist doctors and 18 General practitioners doctors. Group 2 : include 45 teaching staff member from Biology department , Biotechnology department in University of Baghdad and AL-Nahrain University as well as teaching staff member from the college of medicine – University of Baghdad and University of Mustansiryah, this group were sub divided into 9 Ph.D and 36 M.Sc. + B.Sc. me
... Show MoreWA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreBN Rashid, Ajes: Asian Journal of English Studies, 2013
WA Shukur, FA Abdullatif, Ibn Al-Haitham Journal For Pure and Applied Sciences, 2011 With wide spread of internet, and increase the price of information, steganography become very important to communication. Over many years used different types of digital cover to hide information as a cover channel, image from important digital cover used in steganography because widely use in internet without suspicious.
The aim of this study is to determine the organic and inorganic components of bile and gallstones in Iraqi patients. Forty seven patients were included in this study with mean age (53+7) years and BMI (30.82+4.18) Kg/m2. Bile was classified according to its corresponding stones into: Bile of Mixed stones and Bile of pigment stones. IR spectra were studied for both types of stones and their bile in addition to biochemical analysis for organic and inorganic components. The organic components include: (cholesterol, bilirubin, bile salts, and phospholipids), while inorganic components include salts of: (calcium, phosphorus, iron, cupper and magnesium). The results reveal to there was significant low levels (p<0.005) of bile salts and phospholi
... Show More