Preferred Language
Articles
/
bsj-7460
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in
WSN security. The results of analysis indicated a high level of security between the data by depending on the
generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical.
The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually
increasing the network performance. This results in the reduction of the overall amount of energy, and the time
required for performing the key exchange in the encryption and decryption processes decreased.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Studying the Crystal Structure, Topography, and Anti-bacterial of a Novel Titania (TiO2 NPs) Prepared by a Sol-gel Manner
...Show More Authors

In this research, titanium dioxide nanoparticles (TiO2 NPs) were prepared through the sol-gel process at an acidic medium (pH3).TiO2 nanoparticles were prepared from titanium trichloride (TiCl3) as a precursor with Ammonium hydroxide (NH4OH) with 1:3 ratio at 50 °C. The resulting gel was dried at 70 °C to obtain the Nanocrystalline powder. The powder from the drying process was treated thermally at temperatures 500 °C and 700 °C. The crystalline structure, surface morphology, and particle size were studied by using X-ray diffraction (XRD), Atomic Force Microscopy (AFM), and Scanning Electron Microscope (SEM). The results showed (anatase) phase of titanium dioxide with the average grain size

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Trypan Blue Exclusion Assay Verifies in Vitro Cytotoxicity of New Cis-Platinum (II) Complex in Human Cells
...Show More Authors

          Various assays are used to determine the toxic effects of drugs at cellular levels in vitro.  One of these methods is the dye exclusion assay, which measures membrane integrity in the presence of Trypan blue. Trypan blue the dye which was used in this study to investigate cytotoxic effect of a new Cis –dichloroplatinum (II) complex [(Qu)2PtCl2] on the viability of polymorphonuclear cells (PMNs). Three concentrations of platinum complex were prepared (70, 35and 17.5 µg/ ml) and the results revealed that the percentage of cell viability decreased as the platinum complex concentration increased in comparison with control.

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Aug 20 2021
Journal Name
Iraqi Journal Of Laser
Design of Tunable Optical Band Pass Filter based on in-Line PM-Mach Zehnder Interferometer
...Show More Authors

In this paper, tunable optical band-pass filters based on Polarization Maintaining Fiber –Mach Zehnder Interferometer presented. Tunability of the band-pass filter implemented by applying different mechanical forces N on the micro-cavities splicing regions (MCSRs). The micro-cavity formed by using three variable-lengths of single-mode polarization-maintaining fiber with (8, 16, 24) cm lengths, splice between two segments of (SMF-28) with (26, 13) cm lengths, using the fusion splicing technique.  Ellipsoidal shape micro-cavities experimentally achieved parallel to the propagation axis having dimensions between (12-24) μm of width and   (4-12) μm of length. A micro-cavity with width and length as high as 24 μm and 12 μ

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 15 2026
Journal Name
مجلة دراسات وبحوث التربية الرياضية
اثر بيئة افتراضية بالميتافيرس باستخدام تطبيق Home Court في تعلم بعض المهارات الاساسية بكرة السلة للطالبات
...Show More Authors

هدف البحث الى اعداد بيئة تعليمية افتراضية بالميتافيرس باستخدام تطبيق HomeCourt.والتعرف على اثر بيئة افتراضية بالميتافيرس باستخدام تطبيق HomeCourt في تعلم بعض المهارات الاساسية بكرة السلة للطالبات. استخدمت الباحثة المنهج التجريبي بالمجموعتين المتكافئتين بالاختبار القبلي والبعدي, " لأنه يعد أكثر الوسائل كفاية في الوصول إلى معرفة موثوق بها .واعتمدت الباحثة تصميم مجموعتين متساويتين مستقلتين (تجريبية وضابطة ) . اما مجت

... Show More
View Publication
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Determination of the Fertility of Southern Iraqi Soil Using Laser - Induced Breakdown Spectroscopy System
...Show More Authors

In this work, seven soil samples were brought brought to study and analyses the element concentrations from different southern regions of Iraq using laser-induced breakdown spectroscopy (LIBS) technique. It has been documented as an atomic emission spectroscopy (AES) technique. Laser-induced plasma utilized to analyze elements in materials (gases, liquids, and solids). In order to analyze elements in materials (gases, liquids, and solid). The Nd: YAG laser excitation source at 1064 nm with pulse width 9 ns is used to generate power density of 5.5 x 1012 MW/mm2, with optical spectrum in the range 320-740 nm. From this investigation, the soil sample analysis of the southern cities of Iraqi, it is concluded that the rich soil element of P, Si,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Reinforce organizational communication using Information Technology
...Show More Authors
Abstract<p>The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general</p>
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators
...Show More Authors

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

View Publication Preview PDF
Crossref