As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.
Were arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution to chose the suggested market to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms
... Show MoreMeasuring the level of communicative competence in news headlines and the level of stylistic and semantic processing in its formulation requires creating a quantitative scale based on the bases on building the scales and their standards. As judging by scientific of journalism studies lies in the possibility of quantifying the journalistic knowledge, i.e. the ability of this knowledge to shift from qualitative language to its equivalent in the language of numbers.
News headlines and editorial processing are one of the journalistic knowledges that should be studied, analyzed stylistically and semantically; their conclusions drawn and expressed in numbers. Press knowledge is divided into two types:<
... Show MoreBackground: Low-level laser therapy (LLLT) has been extensively applied to improve wound healing due to some biostimulatory properties presented by laser arrays apparently able to accelerate the repair of soft tissue injuries. However, the role of proinflammatory interlukines not been studied yet. IL_1 ? represent one of the most important poroinflammatory interlukines that involved in wound healing. The goal of this study was to investigate the effect of 790-805nm diode laser on the expression of IL_1 ? during wound healing in mice. Materials and Methods: Standard-sized wounds (1.5cm) were carried out in the face of 96 white albino mice. Half of them underwent LLLT treatment (360 J/cm 2) at 790-805 nm delivered immediately after wound pro
... Show MoreThe purpose of this study is to assess the level of computer literacy of the students at AlQuds open university in Tulkarm Branch. The study investigates the effects of the variables of gender, specialization, academic level, owning a personal computer, internet communication, and own an email account on the level of computer literacy. A test of computer literacy was constructed by the researchers consisting of (37) multiple choice items with a reliability rate (0.85). The study population consisted of (4100) students, while the sample contained (352) students. The study revealed that the level of computer literacy of the students at AlQuds Open University in Tulkarm Branch was (66.2 %) which is educationally acceptable. It also
... Show MoreThe study aimed to identify the awareness level of hidden curriculum among field education students, College of Education, Hail University. To identify the different awareness level of hidden curriculum among field education students depending on specialization variable, and grade variable in curriculum and instruction course, a descriptive survey method was used. The study sample consisted of (182) students: 78 students in Islamic Culture major, 46 primary major and 58 in physical education. To achieve the study objectives, a hidden curriculum awareness scale was designed included (36) items. The study results showed: the awareness level of hidden curriculum among students of field education, Education College, Hail University, achieved
... Show Moreأن كرة السلة بما تتضمنه من مهارات حركية متنوعة تتطلب من ممارسيها امتلاك عدد من القدرات الحركية الخاصة وبشكل خاص التوافق العضلي العصبي والرشاقة والقوة المميزة بالسرعة، فضلاعن قدرات الإدراك الحس- حركي (إدراك المكان وقوة دفع الكرة سواء بالطبطبة العالية أو الواطئة .... الخ ) لذا تكمن أهمية البحث في إيجاد الطرق والوسائل التي تطور قدرة الطالبة على إدراك قوة دفع الكرة والإحساس بها أثناء تعلم وتدريب الطبطبة بأنواعها ب
... Show MoreAbstract
The curriculum is the major effective tool in achieving the goals of
education and society.
Many countries that want to reach the forefront of developed countries
through their curriculum have realized this fact. School text book, the
application assessment for knowing the rang of success or fail of this text
book in achieving the general aims. therefore this study aims at assessing the
principals and techniques of geography text book for fourth secondary class of
literary studying from the teachers point of view according to the fields of the
book, style of material, technical arrangement of the material, ethnical
arrangement the language of the book, style of the material, technical
arrang
An integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a
... Show MoreOmentin (or intelectin) is a main visceral fat secretory adipokine. There is a growing interest to link omentin, obesity and co-morbidity factors. The aim of the present study is to evaluate serum omentin and its association to insulin resistance biomarkers, lipid profile and atherogenic indies. This cross – sectional study was conducted in Obesity Research and Therapy Unit-Alkindy College of Medicine by recruiting (115) individuals; 49 males /66 females. Subjects between (20 to 60) years of age were selected and classified into two groups according to their Body mass index (BMI). Group1 involved healthy lean volunteers (25 male/ 36 female; BMI 18.5 - 24.9). Group2 involved obese subjects; (24 male / 36 female with BMI ≥ 30). The s
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More