At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
The optimum cultural conditions for garamicidin production by local isolate B.brevis were studied.Best result was obtained when the isolate B.brevis was grown on media composed of 1%glucose as carbon source,1% ammonium chloride as a nitrogen source ,0.5% Dipotassium hydrogen orthophosphate as a phosphate source and after 48 hours of incubation at 30C .Garamicidin has been extracted and purified through acid precipition and then extracted by organic solvent (ether& acetone ).Using HPLC the garamicidin antibiotic showed three types A,B and C garamicidin .
Assessing water quality provides a scientific foundation for the development and management of water resources. The objective of the research is to evaluate the impact treated effluent from North Rustumiyia wastewater treatment plant (WWTP) on the quality of Diyala river. The model of the artificial neural network (ANN) and factor analysis (FA) based on Nemerow pollution index (NPI). To define important water quality parameters for North Al-Rustumiyia for the line(F2), the Nemerow Pollution Index was introduced. The most important parameters of assessment of water variation quality of wastewater were the parameter used in the model: biochemical oxygen demand (BOD), chemical oxygen dem
In this paper, we used four classification methods to classify objects and compareamong these methods, these are K Nearest Neighbor's (KNN), Stochastic Gradient Descentlearning (SGD), Logistic Regression Algorithm(LR), and Multi-Layer Perceptron (MLP). Weused MCOCO dataset for classification and detection the objects, these dataset image wererandomly divided into training and testing datasets at a ratio of 7:3, respectively. In randomlyselect training and testing dataset images, converted the color images to the gray level, thenenhancement these gray images using the histogram equalization method, resize (20 x 20) fordataset image. Principal component analysis (PCA) was used for feature extraction, andfinally apply four classification metho
... Show MoreIn this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be f
... Show MoreA growing and pressing need for Speech Enhancement Algorithms (SEAs) has emerged with the proliferation of hearing devices and mobile devices that aim to improve speech intelligibility without sacrificing speech quality. Recently, a tremendous number of studies have been conducted in the field of speech enhancement. This study aims to map the field of speech enhancement by conducting a systematic literature review to provide comprehensive details of recently proposed SEAs. This systematic review aims to highlight research trends in SEAs and direct researchers to the most important topics published between 2015 and 2024. It attempts to address seven key research questions related to this topic. Moreover, it covers articles available
... Show More230 stool samples were collected from 2 state homes for (males and females) to investigate
the infection of different intestinal parasites (pathogenic and non-pathogenic).
The infection rate was higher among males 15.7% than females 6%, these rates were
increased when concentration method was employed up to 54.8% for males and 8.7% for
females significantly.
Most infected orphans were found to harbor single parasite followed by double, triple
parasites.
The highest rate of infection was found among young age group (1-5) years old, while
the older age groups got lowest rates.
Of helminthes, the commonest parasite was Hymenolepis nana 5.7% and of protozoa, the
commonest intestinal parasite was Giardia lamblia
This paper aims to explain the effect of workplace respect on employee performance at Abu Ghraib Dairy Factory (AGDF). For achieving the research aim, the analytical and descriptive approach was chosen using a questionnaire tool for collecting data. It covers 22 items; ten of them for the workplace respect variable and twelve items for the employee performance variable. The research population involved human resources who work at AGDF in Baghdad within two administrative levels (top and middle). We conducted a purposive stratified sample approach. It was distributed 70 questionnaire forms, and 65 forms were received. However, six of them had missing data and did not include in the final data analysis. The main results are t
... Show More