At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
BACKGROUND: Vascular tumors are a heterogeneous group of diseases with biological behavior ranging from a hamartomatous growth to frank malignant. The pathophysiology of lymphangioma, vascular malformation and hemangioma is interconnected, blood vessels known to be the site of origin of hamartomas, venous malformations and some neoplasms as benign, tumor-like growth of vessels (hemangiomas). Angiogenesis is the process of formation of new blood vessels from an existing structure.
Aims of study Assessment of angiogenic potential in benign vascular lesions (hemangioma, lymphangioma and lobular capillary hemangioma) of head and neck region.
Materials and Methods: Twenty-two formalin-fixed paraffin-embedd
... Show MoreDAIRMD Professor Hayder R. Al-Hamamy, **Professor Adil A. Noaimi, **Dr. Ihsan A. Al-Turfy, IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2015
Darcy-Weisbach (D-W) is a typical resistance equation in pressured flow; however, some academics and engineers prefer Hazen-Williams (H-W) for assessing water distribution networks. The main difference is that the (D-W) friction factor changes with the Reynolds number, while the (H-W) coefficient is a constant value for a certain material. This study uses WaterGEMS CONNECT Edition update 1 to find an empirical relation between the (H-W) and (H-W) equations for two 400 mm and 500 mm pipe systems. The hydraulic model was done, and two scenarios were applied by changing the (H-W) coefficient to show the difference in results of head loss. The results showed a strong relationship between both equations with correlation coefficients of 0.999,
... Show MoreThe research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .
1-The lack of authority control depends on it to find a
... Show MoreIn light of the increasing importance of interim financial statements they provided these lists of information that enables users of accounting information to make wise investment decisions and predict the company's activities in light of changes the updated rather than wait until the end of the year and accessing information provided by the annual financial statements. In light of this research has come to the most important set of conclusions the adoption of interim financial information has been audited by the external auditor to the availability of basic qualitative characteristics in the accounting information contained in the (appropriate and timely manner, reliability and comparability) and this in turn leads to the impact on reli
... Show MoreThe implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which the author uses it in her play "Pour un oui ou pour un non".
Résumé
... Show Moreفي البداية اود الاشارة الى ان فهم حقيقة الازمة هو ذو جانب فني يتعلق بالجينات الوراثية لنظام يملك في احيناته قدرة عالية على تفريخ المشتقات. هذا النظام الذي يزداد عقما وتدميرا يزداد قدرة على خلق النقود الائتمانية/المشتقات، وكلما اقتربنا اكثر من فهم هذا الجانب كلما اسقطت في ايدينا تلك التوصيفات الاكاديمية الجاهزة في نقص الرقابة والاشراف، تركيز المخاطر،....الخ التي تناولتها الكتابات الشائعة في معظم طروحات
... Show More