Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.
The aim of the research is to identify psychological toughness and its relationship to some coordination, physical abilities and accuracy of some basic performance skills among the players of the Iraqi junior national handball team players. The hypothesis is the existence of a correlation between psychological toughness, coordination, physical abilities, and the accuracy of some basic skills performance among the players of the Iraqi junior national handball team players. The descriptive approach in the style of correlational relations used to suit the research problem, as the community was determined by (18) players for the Iraqi junior national handball team players, while the sample was (14) players, and the samp
... Show MoreThis study aimed to fabricate a curcumin@platinum nanohybrid (CUR@Pt NPs) through a green tea–based synthesis method and to evaluate its various functions, including antioxidant, burn-healing, and selective anticancer activities against PANC-1 pancreatic cancer cells. Green tea polyphenols served as natural reducing and stabilizing agents, facilitating an eco-friendly, single-step manufacturing process. Physicochemical characterization confirmed successful nanohybrid formation: a CUR@Pt band appeared at 457 nm in the UV–Vis spectrum, XRD displayed crystalline platinum peaks at 2θ = 46.9°, and 67.0°, matching the (200), and (220) planes, respectively, and TEM images showed well-dispersed spherical nanoparticles with an average siz
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show Moreلقد توسعت وتطورت انشطة منشآت الاعمال بشكل كبير، وقد تمكنت المحاسبة من التعامل مع هذا التطور من خلال ايجاد المعالجات المحاسبية التي تتوافق مع خصوصية هذه المنشآت وطبيعة انشطتها، وقد ادى مجلس معايير المحاسبة الدولية دوراً مهماً في تحقيق توافق المعالجات المحاسبية في غالبية دول العالم مع المنطق الذي يحمله الفكر المحاسبي.
في الربع الاخير من القرن الماضي ظهرت منشآت ذات خصوصية معينة يس
... Show More