Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in
WSN security. The results of analysis indicated a high level of security between the data by depending on the
generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical.
The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually
increasing the network performance. This results in the reduction of the overall amount of energy, and the time
required for performing the key exchange in the encryption and decryption processes decreased.
In this research an analysis for improving the fatigue behavior (safety factor of fatigue) of non- articular prosthetic foot (SACH) in the region (Bolt Adapter).The laser peening was carried to the fatigue specimens to improving the fatigue properties of bolt’s material. The tests of mechanical properties and fatigue behavior were carried for material that the bolt manufacture from it, a region where the failure occur and inserted of these properties to the program of engineering analysis (Ansys) to calculate the safety factor of fatigue. The results showed that the safety factor after hardening by laser is increased by 42.8%.
The deposition process and investigation of the physical properties of tungsten trioxide (WO3) thin films before and after gamma irradiation are presented in this paper. The WO3 thin films were deposited, using the pulse laser deposition technique, on glass substrates at laser energies of 600mJ and 800mJ. After deposition, the samples were gamma irradiated with Co60. The structural and optical properties of polycrystalline WO3 thin films are presented and discussed before and after 5kGy gamma irradiation at the two laser energies. X-ray diffraction spectra revealed that all the films consisted of WO3 crystallized in the triclinic form; the dislocation density and lattice strain increased with the absorbed dosage of gamma
... Show More—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb
... Show MoreBuilding Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Cent
... Show MoreThis study investigates the role of Enterprise Resources Planning (ERP) systems in improving human resources management (HRM) processes. The rapid environmental changes led to increased demand on the ERP systems, which have changed the manual effort to technology-based processes, providing solutions focusing on the integration of all departments to achieve goals for the entire organization. HRM processes are mainly made up of two classes: strategic and operational HRM. An ERP system works to integrate both of them, making HRM processes more efficient, effective and feasible to provide support to the organization as a whole (inside and outside). In this article, a modest framework is proposed to describe HRM process integrity in relation to
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreWith the continuous progress of image retrieval technology, the speed of searching for the required image from a large amount of image data has become an important issue. Convolutional neural networks (CNNs) have been used in image retrieval. However, many image retrieval systems based on CNNs have poor ability to express image features. Content-based Image Retrieval (CBIR) is a method of finding desired images from image databases. However, CBIR suffers from lower accuracy in retrieving images from large-scale image databases. In this paper, the proposed system is an improvement of the convolutional neural network for greater accuracy and a machine learning tool that can be used for automatic image retrieval. It includes two phases
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show More