Preferred Language
Articles
/
exhwOpYBVTCNdQwCwoKQ
IoT-Based Motorbike Ambulance: Secure and Efficient Transportation
...Show More Authors

The predilection for 5G telemedicine networks has piqued the interest of industry researchers and academics. The most significant barrier to global telemedicine adoption is to achieve a secure and efficient transport of patients, which has two critical responsibilities. The first is to get the patient to the nearest hospital as quickly as possible, and the second is to keep the connection secure while traveling to the hospital. As a result, a new network scheme has been suggested to expand the medical delivery system, which is an agile network scheme to securely redirect ambulance motorbikes to the nearest hospital in emergency cases. This research provides a secured and efficient telemedicine transport strategy compatible with the vehicle social network (VSN). The proposed telemedicine method should find the best ambulance motorbike route for getting patients to the hospital as quickly as possible. This approach also enables the secure exchange of information between ambulance motorbikes and hospitals. Ant colony optimization (ACO) is utilized as a SWARM technique to expand the capabilities of 5G-wireless mesh networks to determine the best path. To secure communication, the secure socket layer (SSL), which is boosted once by the advanced encryption standard (AES), has achieved a new suggested scheme as a cybersecurity approach. According to the performance evaluation, this approach will determine the optimal route for motorbike ambulances. Additionally, this technique establishes a secure connection between ambulance motorbikes and the hospital. The study enhances telemedicine transportation.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Mar 16 2023
Journal Name
Wireless Personal Communications
Technology Applications in Tracking 2019-nCoV and Defeating Future Outbreaks: Iraqi Healthcare Industry in IoT Remote
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Apr 02 2023
Journal Name
Mathematical Modelling Of Engineering Problems
Traffic Classification of IoT Devices by Utilizing Spike Neural Network Learning Approach
...Show More Authors

Whenever, the Internet of Things (IoT) applications and devices increased, the capability of the its access frequently stressed. That can lead a significant bottleneck problem for network performance in different layers of an end point to end point (P2P) communication route. So, an appropriate characteristic (i.e., classification) of the time changing traffic prediction has been used to solve this issue. Nevertheless, stills remain at great an open defy. Due to of the most of the presenting solutions depend on machine learning (ML) methods, that though give high calculation cost, where they are not taking into account the fine-accurately flow classification of the IoT devices is needed. Therefore, this paper presents a new model bas

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
A Study on Transportation Models in Their Minimum and Maximum Values with Applications of Real Data
...Show More Authors

The purpose of this paper is to apply different transportation models in their minimum and maximum values by finding starting basic feasible solution and finding the optimal solution. The requirements of transportation models were presented with one of their applications in the case of minimizing the objective function, which was conducted by the researcher as real data, which took place one month in 2015, in one of the poultry farms for the production of eggs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 06 2018
Journal Name
Indian Journal Of Applied Research
STATISTICAL METHOD FOR SOLVING TRANSPORTATION PROBLEMS OF USING THE PROGRAMMING LANGUAGE MATLAB
...Show More Authors

Original Research Paper Mathematics 1-Introduction : In the light of the progress and rapid development of the applications of research in applications fields, the need to rely on scientific tools and cleaner for data processing has become a prominent role in the resolution of decisions in industrial and service institutions according to the real need of these methods to make them scientific methods to solve the problem Making decisions for the purpose of making the departments succeed in performing their planning and executive tasks. Therefore, we found it necessary to know the transport model in general and to use statistical methods to reach the optimal solution with the lowest possible costs in particular. And you know The Transportatio

... Show More
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Wireless Personal Communications
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Efficient Cost Management in the Housing Projects
...Show More Authors

The cost management of cost indicators in housing projects, on the level of planning and design, is the most important quality indicators, for adoption of strategies of planning and design efficient in managing these indicators. So this research points out the need to highlight the most effective and influential cost indicators in housing projects, and to determine strategies in the management of these indicators in order to raise the efficiency of housing projects quality, to seemly the income level target group, taking into consideration the quality of housing standards, to achieve the basic requirements of housing. This paper highlights the importance of the cost  management, the types of housing cost, the method

... Show More
View Publication Preview PDF