Preferred Language
Articles
/
1BZeY4sBVTCNdQwCT8qD
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobile SN, besides prolong the network lifetime in compare with static SN.

Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Dynamic algorithm (DRBLTS) and potentially weighted (WBP) to estimate hippocampal regression parameters using a techniqueBootstrap (comparative study)
...Show More Authors

Bootstrap is one of an important re-sampling technique which has given the attention of  researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such  Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 12 2025
Journal Name
Karbala Journal Of Physical Education Sciences
Training of different ranges using the (HC-SR04 ultrasonic sensor ) and its effect in developing some of special abilities for young boxers
...Show More Authors

View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Iproceedings
Effect of Reminding Parents on Vaccination Dates Using Mobile Short Messages on the Routine Vaccination Coverage of Infants in Al Resafa-Baghdad, 2015-2016
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Real Time Wireless Monitoring and Controlling of 3-D Single Point Incremental Tool
...Show More Authors

Maintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 13 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
...Show More Authors

Face Recognition Systems (FRS) are increasingly targeted by morphing attacks, where facial features of multiple individuals are blended into a synthetic image to deceive biometric verification. This paper proposes an enhanced Siamese Neural Network (SNN)-based system for robust morph detection. The methodology involves four stages. First, a dataset of real and morphed images is generated using StyleGAN, producing high-quality facial images. Second, facial regions are extracted using Faster Region-based Convolutional Neural Networks (R-CNN) to isolate relevant features and eliminate background noise. Third, a Local Binary Pattern-Convolutional Neural Network (LBP-CNN) is used to build a baseline FRS and assess its susceptibility to d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Compression-based Data Reduction Technique for IoT Sensor Networks
...Show More Authors

Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the

... Show More
View Publication Preview PDF
Scopus (41)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Wireless Indoor Localization Systems and Techniques: Survey and Comparative Study
...Show More Authors

<p>The popularity, great influence and huge importance made wireless indoor localization has a unique touch, as well its wide successful on positioning and tracking systems for both human and assists also contributing to take the lead from outdoor systems in the scope of the recent research works. In this work, we will attempt to provide a survey of the existing indoor positioning solutions and attempt to classify different its techniques and systems. Five typical location predication approaches (triangulation, fingerprinting, proximity, vision analysis and trilateration) are considered here in order to analysis and provide the reader a review of the recent advances in wireless indoor localization techniques and systems to hav

... Show More
View Publication
Scopus (49)
Crossref (37)
Scopus Crossref