Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
Optik
Synthesis of Ag2O films by pulsed laser deposited on porous silicon as gas sensor application
...Show More Authors

View Publication
Scopus (47)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Civil And Environmental Engineering
Prediction of the Delay in the Portfolio Construction Using Naïve Bayesian Classification Algorithms
...Show More Authors
Abstract<p>Projects suspensions are between the most insistent tasks confronted by the construction field accredited to the sector’s difficulty and its essential delay risk foundations’ interdependence. Machine learning provides a perfect group of techniques, which can attack those complex systems. The study aimed to recognize and progress a wellorganized predictive data tool to examine and learn from delay sources depend on preceding data of construction projects by using decision trees and naïve Bayesian classification algorithms. An intensive review of available data has been conducted to explore the real reasons and causes of construction project delays. The results show that the postpo</p> ... Show More
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Multispectral and Panchromatic used Enhancement Resolution and Study Effective Enhancement on Supervised and Unsupervised Classification Land – Cover
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Culture Consumption in an Increase of Deception Marketing , a Sample Survey of Cosmetic Users Employees College of Administration & Economics / University of Mosul
...Show More Authors

Economics / University of Mosul

 

Abstract

The spread of the phenomenon of excessive buying in our society, especially for cosmetics, and at the same time increase the marketing deception by the organizations to take quick profit 'and accordingly was identified the problem of research in several questions, including:

Is there a significant effect of consumption culture on marketing deception?                                                &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Back stepping-Based-PID-Controller Designed for an Artificial Pancreas model
...Show More Authors

Artificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose

 

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Engineering
An Electronic and Web-Based Authentication, Identification, and Logging Management System
...Show More Authors

The need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
The impact of re-engineering to achieve effective performance level of Ministry of electricity operations/an applied study of process reengineering clean solar cells
...Show More Authors

 The study is dealing with an application reengineering process clean solar cells in the Ministry of electricity,  as aimed at the possibility of the applicability and impact of re-engineering to achieve the level of performance of the Ministry's operations, with the application of the cleaning process  solar cells, developed, improved and found a correlation, statistically significant effect between variable re-engineering and performance as well as the application of process reengineering clean solar cells:1- Before the re-engineering process the total time for cleaning up and solar cell 20 minutes and number of columns performed per day 24 columns and total  columns750 which were completed per month that re

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of Effective Bed Thermal Conductivity and Heat Transfer Coefficient in Fluidized Beds
...Show More Authors

Experimental study of heat transfer coefficients in air-liquid-solid fluidized beds were carried out by measuring the heat rate and the overall temperature differences across the heater at different operating conditions. The experiments were carried out in Q.V.F. glass column of 0.22 m inside diameter and 2.25 m height with an axially mounted cylindrical heater of 0.0367 m diameter and 0.5 m height. The fluidizing media were water as a continuous phase and air as a dispersed phase. Low density (Ploymethyl-methacrylate, 3.17 mm size) and high density (Glass beads, 2.31 mm size) particles were used as solid phase. The bed temperature profiles were measured axially and radially in the bed for different positions. Thermocouples were connecte

... Show More
View Publication Preview PDF