Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.
The research aims to investigate the possibility of joint auditing in improving the market value of Iraqi companies listed on the Iraq Stock Exchange. The sample was represented by 10 Iraqi companies listed in the Iraq market for the period from 2014-2017 (2 years before implementation and 2 years after implementation) and the research was based on the idea that joint auditing enhances investor confidence and raises their level of security as a result of providing quality and reliable reports, and thus This indicates good news in the market that reflects on the performance of stocks and the market value of companies that adopt joint auditing. The results of the analysis indicate an improvement in the market value, but this improv
... Show MoreThe military presence in the Gulf region after the British withdrawal from it in 1971 was one of the most important pillars of the American strategy to climb the ladder of global leadership, as the geostrategic features that the region enjoyed provided factors of controlling energy sources and global trade routes. The United States of America guarantees Western Europe and Japan the process of access to energy sources and the exclusion of its opponents from the region, especially the Soviet Union, and the growing American military presence in the Gulf after the invasion of Iraq in 2003. On the other hand, the region experiences many contradictions, some of which threaten its security, such as the exacerbation of disputes between its count
... Show MoreThis work focuses on the preparation of pure nanocrystalline SnO2 and SnO2:Cu thin films on cleaned glass substrates utilizing a sol-gel spin coating and chemical bath deposition (CBD) procedures. The primary aim of this study is to investigate the possible use of these thin films in the context of gas sensor applications. The films underwent annealing in an air environment at a temperature of 500 ◦C for duration of 60 minutes. The thickness of the film that was deposited may be estimated to be around 300 nm. The investigation included an examination of the structural, optical, electrical, and sensing characteristics, which were explored across various preparation circumstances, specifically focusing on varied
... Show MoreTraining and retraining of teachers have become a central issue in Iraq recently especially in-service training of English teachers on the new curricula (Iraq opportunities). English teachers should be objectively evaluated and assessed.
A sample of (40) trained teachers of English is included in the study and a questionnaire is used as the main instrument of the study.
The main findings of the study were the following:
1. The trainees were serious in training on the new course (item 6) the programme helped increase their information (item 4) and motivate them towards better teaching (item 3). The aims of the programme were clear (item1). The programme helped develop their teaching skills (item 2) and was comprehensive (item 5).
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study w
... Show MoreTransportation networks impact millions of people daily. Their efficiency immediately affects travel time, safety, and environmental sustainability. Unfortunately, various issues hinder the expected performance and efficiency of these networks. Traffic congestion is an up-to-date issue in the urban environment. Fuel consumption is high because travel time has increased, which has a passive environmental impact. Extensive research has been conducted to progress the intelligent transportation systems installed on communication networks and information to treat this congestion. However, there is a significant amount of affront residue in combining real-time data, estimation analytics, and 5G abilities effectively. This paper offers a n
... Show MoreRouting is the process of delivering a packet from a source to a destination in the network using a routing algorithm that tries to create an efficient path. The path should be created with minimum overhead and bandwidth consumption. In literature, routing protocols in VANET were categorized in many ways, according to different aspects. In the present study, we prefer the classification based on the number of hops to reach the destination node. In literature, these are single-hop and multi-hops protocols. We first discuss the two types and then compare the MDDV (multi-hops protocol) with VADD (single-hop protocol). The comparison is theoretically and experimentally implemented by providing a network environment consisting of SUMO, VIENS and
... Show MoreTax information system is one of the most important means that help the tax administration to reach the real income of the taxpayer, and the problem of research came in the General Authority for Tax ,The next question (Does the control carried out by the Central Bank on foreign remittances to reach the real income of the taxpayer). The research is gaining importance by focusing on the Central Bank's control over foreign remittances, and how to use this control to finance the tax information system. The relationship between the Central Bank's control over foreign remittances and the tax information system.The study has reached a number of recommendations, the most important of which are the following: The work of an integrated information
... Show MoreA study of the effects of the discharge (sputtering) currents (60-75 mA) and the thickness of copper target (0.037, 0.055 and 0.085 mm) on the prepared samples was performed. These samples were deposited with pure copper on a glass substrate using dc magnetron sputtering with a magnetic flux density of 150 gauss at the center. The effects of these two parameters were studied on the height, diameter, and size of the deposition copper grains as well as the roughness of surface samples using atomic force microscopy (AFM).The results of this study showed that it is possible to control the specifications of copper grains by changing the discharge currents and the thickness of the target material. The increase in discharge curre
... Show MoreThe fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t