Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of strategic leadership skills on effective environmental management according to the (VUCA Prime) model
...Show More Authors

Purpose: clarify the integrative relationship of strategic leadership skills and effective management and the role of those skills combined or individually in achieving effective management.

Research design: The researchers used the quantitative method by surveying a class sample from the heads of the executive departments in a group of Iraqi private banks, consisting of (106) individuals according to the (VUCA Prime) methodology for effective management and the ten skills model for Johansen. The questionnaire was analyzed using a model of the structural equation.

Findings: The most prominent results of the research were the presence of a weak ro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 26 2022
Journal Name
Journal Of Contemporary Medical Sciences
Doxorubicin Immobilization on chitosan-modified silver Nanoparticles as a drug delivery method for effective anticancer treatment
...Show More Authors

Objective: The goal of this research is to load Doxorubicin (DOX) on silver nanoparticles coupled with folic acid and test their anticancer properties against breast cancer. Methods: Chitosan-Capped silver nanoparticles (CS-AgNPs) were manufactured and loaded with folic acid as well as an anticancer drug, Doxorubicin, to form CS-AgNPs-DOX-FA conjugate. AFM, FTIR, and SEM techniques were used to characterize the samples. The produced multifunctional nano-formulation served as an intrinsic drug delivery system, allowing for effective loading and targeting of chemotherapeutics on the Breast cancer (AMJ 13) cell line. Flowcytometry was used to assess therapy efficacy by measuring apoptotic induction.  Results: DOX and CS-Ag

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Jordan Journal Of Mechanical And Industrial Engineering
Empact of Discrete Multi-arc Rib Roughness on the Effective Efficiency of a Solar Air Heater
...Show More Authors

Artificial roughness on the absorber plate of a Solar Air Heater (SAH) is a popular technique for increasing its effective efficiency. The study investigated the effect of geometrical parameters of discrete multi-arc ribs (DMAR) installed below the SAH absorber plate on the effective efficiency. The effects of major roughness factors, such as number of gaps (Ng = 1-4), rib pitch (p/e = 4-16), rib height (e/D = 0.018-0.045), gab width (wg/e = 0.5-2), angle of attack ( = 30-75), and Reynolds number (Re= 2000-20000) on the performance of a SAH are studied. The performance of the SAH is evaluated using a top-down iterative technique. The results show that as Re rises, SAH-effective DMAR's efficiency first ascends to a specified value o

... Show More
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Improvement of Fading Channel Modeling Performance for Wireless Channel
...Show More Authors

Fading channel modeling is generally defined as the variation of the attenuation of a signal with various variables. Time, geographical position, and radio frequency which is included. Fading is often modeled as a random process. Thus, a fading channel is a communication channel that experiences fading. In this paper, the proposed system presents a new design and simulate a wireless channel using Rayleigh channels. Rayleigh channels using two approaches (flat and frequency-selective fading channels) in order to calculate some path space loss efforts and analysis the performance of different wireless fading channel modeling. The results show that the bite error rate (BER) performance is dramatically improved in the value of signal to

... Show More
Scopus (4)
Scopus Crossref
Publication Date
Wed May 30 2018
Journal Name
International Journal Of Computer Networks & Communications
Robot Human Interface for Housekeeper Robot with Wireless Capabilities
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 12 2023
Journal Name
مجلة السياسية والدولية /
Iraq’s Societal Security after 2003: Challenges and Countering Strategies
...Show More Authors

Societal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte

... Show More
View Publication
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020

View Publication
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Solid State Technology
Access Control Security Review: Concepts and Models
...Show More Authors

Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref (1)
Crossref