Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
Pharmaceutical Wastewater Treatment Associated with Renewable Energy Generation in Microbial Fuel Cell Based on Mobilized Electroactive Biofilm on Zeolite Bearer
...Show More Authors

In this study, a novel application of lab-scale dual chambered air-cathode microbial fuel cell (MFC) has been developed for simultaneous bio-treatment of real pharmaceutical wastewater and renewable electricity generation. The microbial fuel cell (MFC) was provided with zeolite-packed anodic compartment and a cation exchange membrane (CEM) to separate the anode and cathode. The performance of the proposed MFC was evaluated in terms of COD removal and power generation based on the activity of the bacterial consortium in the biofilm mobilized on zeolite bearer. The MFC was fueled with real pharmaceutical wastewater having an initial COD concentration equal to 800 mg/L and inoculated with anaerobic aged sludge. Results demo

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 03 2024
Journal Name
Phi Delta Kappan
Literacy-based instruction in STEM
...Show More Authors

Socio-scientific issues provide a great platform to both engage students in scientific topics and assess their understanding of scientific concepts. Nancy R. Singer, Amy Lannin, Maha Kareem, William Romine, and Katie Kline report on the STEM Literacy Project, a three-year National Science Foundation grant that aimed to improve STEM teachers’ knowledge and integration of literacy in their classrooms. They describe teachers’ professional learning, scenario-based assessments and other strategies they incorporated in their STEM classrooms, and how writing enables students to understand real-world issues.

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 13 2016
Journal Name
University Of Baghdad
Employ Mathematical Model and Neural Networks for Determining Rate Environmental Contamination
...Show More Authors

Preview PDF
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks
...Show More Authors

Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Strategic orientation and its reflection on the Learning organization: Survey study of a sample of Makers decision the Iraqi Ministry of Communications
...Show More Authors

The current research focuses on the extent to which the strategic orientation(entrepreneurial orientation, customer orientation, technology orientation, learning orientation, and investment orientation) affects the learning organization (building common vision, systemic thinking, personal dominance, mental models, team learning)The first hypothesis to test the connection relation between research variables and The second hypothesis was to test the relationship between these variables. In order to ascertain the validity of the hypotheses, the research was based on a questionnaire questionnaire prepared according to a number of In addition to building a fifth sub-variable for the strategic orientation (investment orientation) based

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
The credibility of satellite news channels directed in Arabic from the perspective of Iraqi media, Survey Study
...Show More Authors

This research aims at identifying the commitment of satellite news channels in Arabic to the set of important standards that reflect their credibility in dealing with the media material, and considering that these channels give special importance to events in Iraq, as well as the Arab region and the world, decide to choose them and study them with a problem The research was a question about the level of credibility of Iraqi media. This research is descriptive research, which used the survey method on an objective sample of 245 items, while the questionnaire was used as a data collection tool. Seven channels were selected in Arabic for the study. The three most watched channels were chosen. These channels included the channels of Russia t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Bulletin Of The Iraq Natural History Museum
SURVEY WITH REVISED CHECKLIST OF COMPOSITAE IN THE HERBARIUM OF IRAQ NATURAL HISTORY RESEARCH CENTER AND MUSEUM
...Show More Authors

A survey and revised checklist of the species belonging to the family of Compositae for the specimens which are collected and deposited previously at the herbarium of the Iraq Natural History Research Center and Museum, in addition to the current specimens collected for the period 2016-2021. A total of 85 species belonging to 49 genera and 16 tribes are revised with their synonyms, locality, and distributions, flowering and fruiting period.

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref