Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in
WSN security. The results of analysis indicated a high level of security between the data by depending on the
generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical.
The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually
increasing the network performance. This results in the reduction of the overall amount of energy, and the time
required for performing the key exchange in the encryption and decryption processes decreased.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreCredit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res
... Show MoreAccording to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through
... Show MoreThis paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara
... Show MoreWater supply and distribution networks play an important role in our daily activities. They make a substantial contribution to public health by providing potable water for public consumption and non-potable applications such as firefighters and other purposes such as irrigation. This study used ArcMap 10.8 and WaterGEMS CONNECT Edition update 1 version to create a hydraulic network model to simulate the pipes’ network. Detailed network information, including pipe lengths, layouts, and diameters, was given by the Baghdad Water Department. The TUF-2000H Handheld digital ultrasonic flow meter has been used to measure the water flows in the network’s source nodes. In eight junctions,
Currently and under the COVID-19 which is considered as a kind of disaster or even any other natural or manmade disasters, this study was confirmed to be important especially when the society is proceeding to recover and reduce the risks of as possible as injuries. These disasters are leading somehow to paralyze the activities of society as what happened in the period of COVID-19, therefore, more efforts were to be focused for the management of disasters in different ways to reduce their risks such as working from distance or planning solutions digitally and send them to the source of control and hence how most countries overcame this stage of disaster (COVID-19) and collapse. Artificial intelligence should be used when there is no practica
... Show MoreCoronavirus disease (Covid-19) has threatened human life, so it has become necessary to study this disease from many aspects. This study aims to identify the nature of the effect of interdependence between these countries and the impact of each other on each other by designating these countries as heads for the proposed graph and measuring the distance between them using the ultrametric spanning tree. In this paper, a network of countries in the Middle East is described using the tools of graph theory.
The purpose of this study was to find out the connection between the water parameters that were examined in the laboratory and the water index acquired from the examination of the satellite image of the study area. This was accomplished by analysing the Landsat-8 satellite picture results as well as the geographic information system (GIS). The primary goal of this study is to develop a model for the chemical and physical characteristics of the Al-Abbasia River in Al-Najaf Al-Ashraf Governorate. The water parameters employed in this investigation are as follows: (PH, EC, TDS, TSS, Na, Mg, K, SO4, Cl, and NO3). To collect the samples, ten sampling locations were identified, and the satellite image was obtained on the
... Show More