Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in
WSN security. The results of analysis indicated a high level of security between the data by depending on the
generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical.
The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually
increasing the network performance. This results in the reduction of the overall amount of energy, and the time
required for performing the key exchange in the encryption and decryption processes decreased.
Enhancement of the performance for hybrid solar air conditioning system was presented in this paper. The refrigerant temperature leaving the condenser was controlled using three-way valve, this valve was installed after the compressor to regulate refrigerant flow rate towards the solar system. A control system using data logger, sensors and computer was proposed to set the opening valve ratio. The function of control program using LabVIEW software is to obtain a minimum refrigerant temperature from the condenser outlet to enhance the overall COP of the unit by increasing the degree of subcooled refrigerant. A variable load electrical heater with coiled pipe was used instead of the solar collector and the storage tank to simulate the sola
... Show MoreWith its rapid spread, the coronavirus infection shocked the world and had a huge effect on billions of peoples' lives. The problem is to find a safe method to diagnose the infections with fewer casualties. It has been shown that X-Ray images are an important method for the identification, quantification, and monitoring of diseases. Deep learning algorithms can be utilized to help analyze potentially huge numbers of X-Ray examinations. This research conducted a retrospective multi-test analysis system to detect suspicious COVID-19 performance, and use of chest X-Ray features to assess the progress of the illness in each patient, resulting in a "corona score." where the results were satisfactory compared to the benchmarked techniques. T
... Show MoreWireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreThis work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreIn this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreResearch deals the crises of the global recession of the facets of different and calls for the need to think out of the ordinary theory and find the arguments of the theory to accommodate the evolution of life, globalization and technological change and the standard of living of individuals and the size of the disparity in income distribution is not on the national level, but also at the global level as well, without paying attention to the potential resistance for thought the usual classical, Where the greater the returns of factors of production, the consumption will increase, and that the marginal propensity to consume may rise and the rise at rates greater with slices of low-income (the mouths of the poor) wi
... Show MoreIn this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3) of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the
... Show MoreUntreated municipal solid waste (MSW) release onto land is prevalent in developing countries. To reduce the high levels of harmful components in polluted soils, a proper evaluation of heavy metal concentrations in Erbil's Kani Qrzhala dump between August 2021 and February 2022 is required. The purpose of this research was to examine the impact of improper solid waste disposal on soil properties within a landfill by assessing the risks of contamination for eight heavy elements in two separate layers of the soil by using geoaccumulation index (I-geo) and pollution load index (PLI) supported. The ArcGIS software was employed to map the spatial distribution of heavy element pollution and potential ecological risks. The I-geo values in summe
... Show MoreEntropy define as uncertainty measure has been transfared by using the cumulative distribution function and reliability function for the Burr type – xii. In the case of data which suffer from volatility to build a model the probability distribution on every failure of a sample after achieving limitations function, probabilistic distribution. Has been derived formula probability distribution of the new transfer application entropy on the probability distribution of continuous Burr Type-XII and tested a new function and found that it achieved the conditions function probability, been derived mean and function probabilistic aggregate in order to be approved in the generation of data for the purpose of implementation of simulation
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.