Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Thu Dec 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey on bio-signal analysis for human-robot interaction
...Show More Authors

<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (319)
Crossref (285)
Scopus Clarivate Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Studying the effective of conductor polymer substrate on the electrical properties of semiconductors
...Show More Authors

This research includes depositionof thin film of semiconductor, CdSe by vaccum evaporation on conductor polymers substrate to the poly aniline where, the polymer deposition on the glass substrats by polymerization oxidation tests polymeric films and studied the structural and optical properties through it,s IR and UV-Vis , XRD addition to thin film CdSe, on of the glass substrate and on the substrate of polymer poly-aniline and when XRD tests was observed to improve the properties of synthetic tests as well as the semiconductor Hall effect proved to improve the electrical properties significantly

View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Jul 31 2012
Journal Name
Journal Of Babylon University/pure And Applied Sciences/
An Evaluation of the Effect of Bleaching Agent on Microhardness of a New Silorane-Based Restorative System and Methacrylate-Based Restorative Material
...Show More Authors

Abstract Rasha Hameid Jehad Baghdad University Background: The high reactivity of hydrogen peroxide used in bleaching agents have raised important questions on their potential adverse effects on physical properties of restorative materials. The purpose of this in vitro study was to evaluate the effect of in-office bleaching agents on the microhardness of a new Silorane-based restorative material in comparison to methacrylate-based restorative material. Materials and method: Forty specimens of Filtek™ P90 (3M ESPE,USA) and Filtek™ Supreme XT (3M ESPE, USA) of (8mm diameter and 3m height) were prepared. All specimens were polished with Sof-Lex disks (3M ESPE, USA). All samples were rinsed and stored in incubator 37˚C for 24 ho

... Show More
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Enhancing national security through foreseeing the economic intelligence system in Iraq
...Show More Authors

 

         Economic intelligence represents a modern field of knowledge that has been and is still the focus of many studies and research, including this research that deals with economic intelligence and its role in strengthening Iraqi national security - an analytical study. Economic development and economic development without security, and in a situation such as that of Iraq, which is still suffering from conflicts, conflicts and the effects of wars, as well as the unstable conditions in its regional environment, the directions of that relationship cannot be determined except through the availability of accurate information, indicators, full knowledge of reality and the pos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Al-nahrain University Science
ON THE GREEDY RADIAL BASIS FUNCTION NEURAL NETWORKS FOR APPROXIMATION MULTIDIMENSIONAL FUNCTIONS
...Show More Authors

The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
Obscene speech in the Qur'anic perspective An objective study based on the verses and interpretation of the Noble Qur’an in diagnosis and treatment
...Show More Authors

t:

The most famous thing a person does is talk. He loves and hates, and continues with it confirming relationships, and with it, too, comes out of disbelief into faith. Marry a word and separate with a word. He reaches the top of the heavens with a kind word, with which he will gain the pleasure of God, and the Lord of a word that the servant speaks to which God writes with our pleasure or throws him on his face in the fire. Emotions are inflamed, the United Nations is intensified with a word, and relations between states and war continue with a word.

What comes out of a person’s mouth is a translator that expresses the repository of his conscience and reveals the place of his bed, for it is evidence of

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Corrosion Effective of Condensed Synthetic Automotive Solution Containing Selective Organic Component Mixtures on Al-alloys
...Show More Authors

Abstract

 This work involves studying the effect of adding some selective organic component mixture on corrosion behavior of pure Al and its alloys in condensed synthetic automotive solution (CSAS) at room temperature. This mixture indicates the increasing of octane number in previous study and in this study show the increasing in corrosion resistance through the decreasing in corrosion rate values.

Electrochemical measurements were carried out by potentiostat at 3 mV/sec to estimate the corrosion parameters using  Tafel extrapolation method, in addition to cyclic polarization test to know the pitting susceptibility of materials in tested medium.

The cathodic Tafel slope

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EDUCATIONAL SURVEY ABOUT AWARENESS OF TONSILLITIS IN BABYLON PROVINCE: EDUCATIONAL SURVEY ABOUT AWARENESS OF TONSILLITIS IN BABYLON PROVINCE
...Show More Authors

Tonsillitis is an infection or inflammation of the tonsils. Tonsillitis classified as acute, chronic (recurrent) and complication. Most often it is caused by a virus, but it may also be caused by the same bacteria that cause strep throat. According to numbers that data shows, the virus is more common, about 77.49% than bacterial which about 71.45% then fungal about 9.6%. The principal symptom of tonsillitis is a sore throat fever, swollen lymph nodes, nasal congestion, difficulty in swallowing and headache may also occur, according to if  symptoms of tonsillitis are known or not, data show that they know about (119 of people) (79.3) this result is greater than unknown which was about 31 (20.7).

View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (9)
Crossref