Future generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are described in depth, together with the movement patterns they are related with. Furthermore, two-simulation scenarios conduct with help of an NS-3 simulator. The first scenario investigates the effect of UAV Speed by varying it from 10 to 50 m/s. the second scenario investigates the effect of the size of the transmitting packet by varying it from 64 to 1024 bytes. The performance of GM and RWP was compared based on packet delivery ratio (PDR), goodput, and latency metrics. Results indicate that the GM model provides the highest PDR and lowest latency in such high mobility environments.
In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreHousing finance is one of the main components of housing, and it is relied upon to help families buy, build, add building, and housing improve. Accordingly, different countries all over the world set policies and strategies for the purpose of organizing and developing the financial sector to solve quantitative and qualitative housing problems.
This research aims to identify housing finance policies and strategies in Iraq and Baghdad governorate.
The most prominent sources of housing financing are the Real Estate Bank and the Housing Fund, and accordingly the focus has been on the role of these two institutions in filling
... Show MoreThe research aims to identify the reality of the management strategy followed in the treatment of solid waste in the city of Baquba, and what strategies are used to treat solid waste, and the extent of the application of these strategies, through personal interviews with leading cadres in the Directorate of Baquba Municipality, their assistants and heads of departments, they numbered (55) Individuals. The descriptive method was adopted through a questionnaire prepared to measure the extent of the implementation of the strategy of solid waste management in the city of Baquba and using statistical tools including (arithmetic mean, standard deviation, relative importance, the gap). The research reac
... Show MoreMalware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreThe process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show More