At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
This research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize
... Show MoreExpected to The organizational commitment by employees increases their loyalty towards their organization and thus contribute to enhancing their performance , therefore this study aimed to discover the relationship and the impact between the organizational commitment (emotional commitment, standard commitment, continuous commitment) and the performance of employees in the company researched, additional to know the available organizational commitment levels of employees in the company researched and its impact on the performance of employees, Research was conducted at the General Company for products in the dairy to achieve the goals of research has been developed questionnaire conation (22 ) items to collect data from the study s
... Show MoreA cost-effective and efficient detector was created to conduct thorough turbidimetric measurements by reaction of Co (II) ion with calcium ferro cyanide to form bright green particulate, using the method of continuous flow injection analysis, the use of NAG-5SX1-1D-SSP Analyzer in determining cobalt (II) ion in a test for the validity of the new design. The NAG-5SX1-1D-SSP Analyzer is composed of five irradiation sources of white snow leds having the diameter of 10 mm with one solar cell of 55 mm length, 13.5 mm width. Using a selector switch to select the optimum voltage to be used which was 2.7 VDC. Under conditions of optimization, cobalt (II) ion was determined at 0.005–20 mmol. L–1(n = 23) while linearity dynamic range 0.005–7 mm
... Show MoreThe present study deals with the story of Epidemic in two literary works issued in the same year (1947). One of them is a novel titled "Plague" written by the French writer Alber Kamo, the second is a poem of the Iraqi poetess Nazik Al-Malaekah. The research reflects a contrastive study of the war vision in the two works as both writers used science to serve literature by using Epidemic as a metaphor to refer to the dangers that the societies faced.
The problem of the present research lies in answering the question about the reason that makes the two writers use metaphor while narrating the issues of the society instead of mentioning them directly and illuminate what implications do the narrative style of Epidemic story have and
... Show MoreReservoir permeability plays a crucial role in characterizing reservoirs and predicting the present and future production of hydrocarbon reservoirs. Data logging is a good tool for assessing the entire oil well section's continuous permeability curve. Nuclear magnetic resonance logging measurements are minimally influenced by lithology and offer significant benefits in interpreting permeability. The Schlumberger-Doll-Research model utilizes nuclear magnetic resonance logging, which accurately estimates permeability values. The approach of this investigation is to apply artificial neural networks and core data to predict permeability in wells without a nuclear magnetic resonance log. The Schlumberger-Doll-Research permeability is use
... Show MoreThe objective of the study was to predict crop coefficient (K) values for cucumber inside the greenhouse during the growing season 2014, using watermarks gypsum blocks and atmometer c apparatus during the growing stages and to compare the predicted values of the crop coefficient with different methods and approaches. The study was conducted in the greenhouses field within Al-Mahawil Township, 70 km south of Baghdad, Iraq. The watermarks soil water sensors and atmometer apparatus were used to measure crop evapotranspiration and reference evapotranspiration on daily basis, respectively. The comparison and the statistical analysis between the calculated K in this study and values obtained from greenhouse gave a good agreement. The root mean
... Show MoreIn this work, porous silicon (PS) are fabricated using electrochemical etching (ECE) process for p-type crystalline silicon (c-Si) wafers of (100) orientation. The structural, morphological and electrical properties of PS synthesized at etching current density of (10, 20, 30) mA/cm2 at constant etching time 10 min are studied. From X-ray diffraction (XRD) measurement, the value of FWHM is in general decreases with increasing current density for p-type porous silicon (p-PS). Atomic force microscope (AFM) showed that for p-PS the average pore diameter decreases at 20 mA. Porous silicon which formed on silicon will be a junction so I-V characteristics have been studied in the dark to calculate ideality factor (n), and saturation current (Is
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show Moreيهدف البحث الى صياغة استراتيجية اعلامية لمواجهة اعلام التنظيمات الارهابية