Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sat Dec 31 2022
Journal Name
Mathematical Modelling Of Engineering Problems
Investigation of Energy Efficient Clustering Algorithms in WSNs: A Review
...Show More Authors

In recent years, Wireless Sensor Networks (WSNs) are attracting more attention in many fields as they are extensively used in a wide range of applications, such as environment monitoring, the Internet of Things, industrial operation control, electric distribution, and the oil industry. One of the major concerns in these networks is the limited energy sources. Clustering and routing algorithms represent one of the critical issues that directly contribute to power consumption in WSNs. Therefore, optimization techniques and routing protocols for such networks have to be studied and developed. This paper focuses on the most recent studies and algorithms that handle energy-efficiency clustering and routing in WSNs. In addition, the prime

... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Reviews In Agricultural Science
Technological Advances in Soil Penetration Resistance Measurement and Prediction Algorithms
...Show More Authors

Soil compaction is one of the most harmful elements affecting soil structure, limiting plant growth and agricultural productivity. It is crucial to assess the degree of soil penetration resistance to discover solutions to the harmful consequences of compaction. In order to obtain the appropriate value, using soil cone penetration requires time and labor-intensive measurements. Currently, satellite technologies, electronic measurement control systems, and computer software help to measure soil penetration resistance quickly and easily within the precision agriculture applications approach. The quantitative relationships between soil properties and the factors affecting their diversity contribute to digital soil mapping. Digital soil maps use

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Radioactivity and annual effective dose in some types of drug
...Show More Authors

The aim of this research is to know danger of radioactive isotopes
that are found in samples of drugs traded in Iraqi markets. The
samples are Iraqi Amoxicillin, English Amoxicillin, UAE
Amoxicillin, Indian Amoxicillin, Iraqi Paracetamol, English
Paracetamol, UAE Paracetamol and Indian Paracetamol. By high
purity germanium the activity of the following isotopes 40K, 214Pb,
228Ac and 137Cs is measured and the specific activity was used to
calculate the annual effective dose. Then the calculated annual
effective dose values are compared with the allowable annual
effective dose values of each part of digestive channel. This research
concluded that the measured annual effective dose values are not
dangerous.<

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Heliyon
Exploring nanobioceramics in wound healing as effective and economical alternatives
...Show More Authors

View Publication
Scopus (28)
Crossref (26)
Scopus Crossref
Publication Date
Mon May 27 2024
Journal Name
Eureka: Physics And Engineering
Systematic development of an autonomous robotic car for fire-fighting based on the interactive design approach
...Show More Authors

Fire incidences are classed as catastrophic events, which mean that persons may experience mental distress and trauma. The development of a robotic vehicle specifically designed for fire extinguishing purposes has significant implications, as it not only addresses the issue of fire but also aims to safeguard human lives and minimize the extent of damage caused by indoor fire occurrences. The primary goal of the AFRC is to undergo a metamorphosis, allowing it to operate autonomously as a specialized support vehicle designed exclusively for the task of identifying and extinguishing fires. Researchers have undertaken the tasks of constructing an autonomous vehicle with robotic capabilities, devising a universal algorithm to be employed

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Network And Computer Applications
L-CAQ: Joint link-oriented channel-availability and channel-quality based channel selection for mobile cognitive radio networks
...Show More Authors

View Publication
Scopus (16)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Real Time Wireless Monitoring and Controlling of 3-D Single Point Incremental Tool
...Show More Authors

Maintenance of machine tools can be improved significantly by analyzing the operating of manufacturing process with the real-time monitoring system for 3-D single point deformation measurements. Therefore, the process of manufacturing could be optimized with less cost. Recently, wireless technology and internet of things (IOT) applied on intelligent machine has witnessed a significant advance with augmented virtuality, the analysis and the process certainly would contribute to enhance the intelligence of that machine. This paper presents a group of the wireless sensors and 3D animation technologies for data monitoring and analyzing. Three degree of freedom robotic hand structure has been selected as a prototype to be form the process of the

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Plant Archives
Survey of exotic plant species in Iraq
...Show More Authors

Scopus
Publication Date
Mon Dec 24 2018
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY OF THE MARINE FISHES IN IRAQ
...Show More Authors

    A survey of fish species in the Iraqi marine waters was carried out for the period from November 2014 to March 2018. The list included 214 species representing 75 families.

 

     The family Carangidae dominated the marine fishes in Iraq, which was represented by 24 species, followed by Haemulidae with 11 species, and then Serranidae and Sparidae with nine species for each, while 34 families contained a single species only.

View Publication Preview PDF
Scopus (18)
Crossref (9)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (8)
Scopus Clarivate Crossref