Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.
Background: Occupational exposure to hazardous drugs occurs in all aspects of anticancer drug handling. Proper recommendations and guidelines should be applied to control and reduce exposure. Objective: To assess pharmacists' knowledge and practice regarding the safe handling of anticancer drugs. Methods: A cross-sectional study was conducted at seven major hospitals in Baghdad City, Iraq, from December 2023 to February 2024. A pre-designed questionnaire was given to pharmacists who handled anticancer drugs in chemotherapy units. The questionnaire comprises sociodemographic data, knowledge of the safe handling of cytotoxic drugs and thoughts about exposure and risk, practices for safely handling cytotoxic drugs, and challenges for s
... Show MoreBackground: Although various imaging modalities are available for evaluating suspicious breast lesions, ultrasound-based Shear-Wave Elastography (SWE) is an advanced, non-invasive technique complementary to grayscale sonography. This technique evaluates the elasticity of a specific tissue by applying sonic pressure to that tissue.
Objective: The aim is to assess the role of SWE in evaluating solid breast masses in correlation to histopathological study results.
Subjects and Methods: This prospective study was done in a tertiary care teaching hospital from September 2019 to August 2020. A study population of 50 women aged 18 years or above with an
... Show MoreObjective : The present study is aimed to evaluate the effectiveness of short wave diathermy and
ultrasound therapy for the management of patients with knee osteoarthritis
Methodology : all patients who referred to the Medical Rehabilitation Unit in Baghdad Teaching
Hospital and Sadr A!-Qanat Center. The period of the study was from October 2004 to April 2005, total
number of patients was 24 (9 male and 15 female). Age range of patients was 42-70 years. Complete
clinical and radiological examinations were achieved on all patients and referred to the Medical
Rehabilitation Unit for physiotherapy. Short wave diathermy and ultrasound therapy were applied on
all patients.
Results : Demographic distribution revealed th
<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreOne of the important goals in the learning process is to be effective learning through the self-direction of the learner , because it has an impact on the effort of learners , it is better to be a learner responsible for learning and independent of the acquisition of knowledge ,
اذ اكدتكثيرAs many have confirmed منFrom الدراساتStudies والادبياتAnd literature انthat فشلالكثير The failure of many منFrom الطلبةStudents فيin a تنظيمgroup المعلوماتthe information ومعالجتهاAnd processed اثناءduring عمليةProcess تعلمهمLearn them لاNo يرجعReturns الىto me انخفاضdrop فيin a درجةDegree ذكائهمTheir intelligence اوor عدمNo
... Show More