Preferred Language
Articles
/
XBgvGJgBVTCNdQwC2rmr
Enhanced Security Taxonomy for Fog-Enabled VANETs: A Comprehensive Survey on Attacks, Challenges, Applications and Architectures
...Show More Authors

Vehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that classifies threats, attack vectors, and mitigation strategies across various applications and architectures. Additionally, this study outlines methods for secure data sharing, real-time authentication, and threat mitigation while evaluating emerging security frameworks. By highlighting the advantages of FC—such as localized data privacy management, mobility support, and real-time decision-making—this survey establishes a foundation for future research and innovation in developing secure, scalable, and robust VANET systems. The findings offer practical implications for designing next-generation ITS with enhanced security and operational efficiency.

Scopus Crossref
View Publication
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
A Discourse Taxonomy of Language Cliched Units in English and Russian: Дискурсивная таксономия языковых клишированных единиц в английском и русском языках
...Show More Authors

 

 The paper exposes a discourse taxonomy of language clichéd units in English and Russian, and presents some definitions of what is a cliché as being a semioticform of perceiving language and discourse. Also, it deals with language clichés as being units of structure reflecting a scheme of stereotypical situations of dialogue, whether among individuals of one culture, or in relation to cross-cultural communication. The paper proposes a taxonomy of units in language clichés in English and Russian by tackling clichés of daily use, such as professional, cultural, artistic, and scientific clichés.

Аннотация

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2024
Journal Name
International Review On Modelling And Simulations (iremos)
Prosthetic Hand: a Brief Survey of Design and Actuation Technologies
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Opennano
Development and characterization of bilastine nanosuspension for enhanced dissolution in orodispersible films
...Show More Authors

Abstract Bilastine, a second-generation antihistamine, is commonly prescribed for managing allergic rhinoconjunctivitis and urticaria due to its prolonged action. However, its therapeutic potential is constrained by poor water solubility and low oral bioavailability. This study aimed to enhance bilastine dissolution and patient compliance by formulating a nanosuspension-based orodispersible film (ODF). An anti-solvent precipitation method was employed to produce nanosuspension using different hydrophilic stabilizers (Soluplus®, Poloxamer 188, and PEG 6000). The influence of formulation parameters, such as the stabilizer ratio, the anti-solvent ratio, stirring speed, and the stabilizer type, on particle size and polydispersity index (PDI)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Geological Journal
Construction of Comprehensive Geological Model for an Iraqi Oil Reservoir
...Show More Authors

The paper generates a geological model of a giant Middle East oil reservoir, the model constructed based on the field data of 161 wells. The main aim of the paper was to recognize the value of the reservoir to investigate the feasibility of working on the reservoir modeling prior to the final decision of the investment for further development of this oilfield. Well log, deviation survey, 2D/3D interpreted seismic structural maps, facies, and core test were utilized to construct the developed geological model based on comprehensive interpretation and correlation processes using the PETREL platform. The geological model mainly aims to estimate stock-tank oil initially in place of the reservoir. In addition, three scenarios were applie

... Show More
Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Thu Jun 01 2023
Journal Name
Sustainable Engineering And Innovation
A review of enhanced image techniques using chaos encryption
...Show More Authors

Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Water Temperature Effect on Hardness and Flexural Strength of (PMMA/TiO2 NPs) for Dental Applications
...Show More Authors

PMMA (Poly methyl methacrylate) is considered one of the most commonly used materials in denture base fabrication due to its ideal properties. Although, a major problem with this resin is the frequent fractures due to heavy chewing forces which lead to early crack and fracture in clinical use. The addition of nanoparticles as filler performed in this study to enhance its selected mechanical properties. The Nano-additive effect investigated in normal circumstances and under a different temperature during water exposure. First, tests applied on the prepared samples at room temperature and then after exposure to water bath at (20, 40, 60) C° respectively. SEM, PSD, EDX were utilized for samples evaluation in this study. Flexural

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Al-mansour Journal
Biometrics Systems Challenges in a Post-COVID-19 Pandemic World: A review
...Show More Authors

One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an

... Show More
View Publication Preview PDF