Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
A Survey of Prosthodontics Techniques Applied by Dental Practitioners in Sulaimani City
...Show More Authors

Background: Prosthodontic services have changed markedly due to an introduction of new materials, techniques and treatment options. The aim of this study were to identify the type of materials and the methods used by dental practitioners in their clinics to construct conventional complete dentures and to specify the type and design for removable partial dentures (RPDs); and to then compare them with those taught in dental schools. Materials and methods: A total of 153 dental practitioners in Sulaimani city completed a written questionnaire. The questionnaire included 19 questions regarding complete and RPDs fabrication. Results: Most of the practitioners provide complete dentures (81.6%) and RPDs (95.3%) in their clinics. Polyvinyl silox

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
SURVEY OF PREDATOR AND PARASITOID INSECTS IN DUHOK PROVINCE, KURDISTAN REGION, IRAQ
...Show More Authors

A total of 47 species belonging to 46 genera, 34 subfamilies, 23 families and 7 orders of predator and parasitoid insects were collected and identified. The survey was conducted throughout the program held by the General Directorate of Agriculture-Duhok, in cooperating with the College of Agricultural Engineering Sciences in Duhok Province, Kurdistan Region, Iraq from May 2013 to April 2014.
The species hosts, collecting date, locality and distributions are given. The current checklist also included some species previously collected by other researchers in Duhok Province.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey of deepfakes in terms of deep learning and multimedia forensics
...Show More Authors

Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Effective administrative leadership in the implementation of public policies: Analytical look at the Baghdad Provincial Council
...Show More Authors

Abstract

      The current research aims to find out the role of administrative leadership in the implementation of public policies and their effectiveness and their ability to do so, As well as analysis and testing of influence and correlations between research variables, The researcher has the descriptive and analytical approach, And several tools used to gather information consisted of personal interviews and field visits, While distributed questionnaire tool that consists of (35) items on a sample consisting of (147) individuals formed of staff of the Baghdad Provincial Council.

The research was based on a set of assum

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Journal Of Physics: Conference Series
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. T</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
مجلة الباحث
"The Pinkerton Agency" and its security activities in the United States of America 1850-1899
...Show More Authors

Fast economical developments in the US. in second half of nineteenth century contained many social results, such as increasing of stealing and killing crimes and expand of Labor strikes, which resulted in violence actions, and presented acceptable reason for emergence specialist security agencies, first of them "Pinkerton Agency". which played important role in all of that, besides that .. its role in American Civil War such as discovering an attempt to kill elected republican president Abraham Lincoln. This research studied all that aspects, focused on period of 1850 - 1899 of agency's history.

View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Enhancement of functionalized carbon nanotubes gas sensor by adding metal oxide nanoparticles
...Show More Authors

Functionalized-multi wall carbon nanotubes (F-MWCNTs) and functionalized-single wall carbon nanotubes (F-SWCNTs) were well enhanced using CoO Nanoparticles. The sensor device consisted of a film of sensitive material (F-MWCNTs/CoONPs) and (F-SWCNTs/CoO NPs) deposited by drop- casting on an n-type porous silicon substrate. The two sensors perform high sensitivity to NO2 gas at room temperatures. The analysis indicated that the (F-MWCNTs/CoONPs) have a better performance than (F-SWCNTs/CoONPs). The F-SWCNTs/CoONPs gas sensor shows high sensitivity (19.1 %) at RT with response time 17 sec, while F-MWCNTs/CoONPs gas sensor show better sensitivity (39 %) at RT with response time 13 sec. The device shows a very reproducible sensor p

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Preparation and characterization of mixed SnO2:CdO thin films as gas sensor
...Show More Authors

In this study, tin oxide (SnO2) and mixed with cadmium oxide (CdO) with concentration ratio of (5, 10, 15, 20)% films were deposited by spray pyrolysis technique onto glass substrates at 300ºC temperature. The structure of the SnO2:CdO mixed films have polycrystalline structure with (110) and (101) preferential orientations. Atomic force microscopy (AFM) show the films are displayed granular structure. It was found that the grain size increases with increasing of mixed concentration ratio. The transmittance in visible and NIR region was estimated for SnO2:CdO mixed films. Direct optical band gap was estimated for SnO2 and SnO2 mixed CdO and show a decrease in the energy gap with increasing mixing ratio. From Hall measurement, it was fou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Aug 21 2025
Journal Name
Computers
A Comprehensive Review of Sensor Technologies in IoT: Technical Aspects, Challenges, and Future Directions
...Show More Authors

The rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes, process data, and communicate seamlessly within interconnected networks. Typically, such devices integrate low-power radio transmitters and multiple smart sensors, hence enabling efficient functionality across wide ranges of applications. Alongside these technological developments, the concept of the IoT has emerged as a transformative paradigm, facilitating the interconnection of uniquely identifiable devices through internet-based networks. This paper aims to provide a comprehensive ex

... Show More
View Publication
Scopus (19)
Crossref (23)
Scopus Crossref