Preferred Language
Articles
/
1BZeY4sBVTCNdQwCT8qD
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobile SN, besides prolong the network lifetime in compare with static SN.

Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Text Hiding in Color Images Using the Secret Key Transformation Function in GF (2n)
...Show More Authors

Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.

View Publication Preview PDF
Publication Date
Fri Sep 08 2006
Journal Name
Journal Of Engineering
INFLUENCE OF DEFECT IN THE CONCRETE PILES USING NON-DESTRUCTIVE TESTING
...Show More Authors

This paper presents the results of experimental investigation carried out on concrete model piles to study the behaviour of defective piles. This was achieved by employing non-destructive tests using ultrasonic waves. It was found that the reduction in pile stiffness factor is found to be about (26%) when the defect ratio increased from (5%) to (15%). The modulus of elasticity reduction factor as well as the dynamic modulus of elasticity reduction factor increase with the defect ratio

Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reducing of Corrosion Rate in Boiler Tubes by Using Oxygen Scavengers
...Show More Authors

The corrosion behavior of carbon steel at different temperatures 100,120,140 and 160 Cͦ under different pressures 7,10 and 13 bar in pure distilled water and after adding three types of oxygen scavengers Hydroquinone, Ascorbic acid and Monoethanolamine in different concentrations 40,60 and 80 ppm has been investigated using weight loss method. The carbon steel specimens were immersed in water containing 8.2 ppm dissolved oxygen (DO) by using autoclave. It was found that corrosion behavior of carbon steel was greatly influenced by temperature with high pressure. The corrosion rate decreases, when adding any one of oxygen scavengers. The best results were obtained at a concentration of 80 ppm of each scavenger. It was observed that 

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 17 2012
Journal Name
Journal Of The College Of Basic Education
Image Retrieval Using DCT/KWT and D4/KWT in Distributed System
...Show More Authors

This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff

... Show More
Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Importance of Using Concentrator Solar Energy Technologies in Anbar Province
...Show More Authors

The aim of the research is a techno-economic analysis of the use of concentrated solar energy technologies in the Iraqi city, considering the concentrated solar energy technology is a renewable energy technology that derives its resources from the sun and is replenished at a rate that exceeds its use. It is also inexhaustible and environmentally friendly energy from its environmental footprint, unlike traditional fossil energy which produces greenhouse gases and a major cause of global warming.

This research measures the costs of concentrated solar energy technology to Reduce the effects caused by other energies and work to fill part of the shortfall in the total electricity production, even at a specific percentage, in preparati

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Penetration of charged particles in ZnO using energy loss function model
...Show More Authors

In this paper, we propose an approach to estimate the induced potential, which is generated by swift heavy ions traversing a ZnO thin film, via an energy loss function (ELF). This induced potential is related to the projectile charge density, ρq(k) and is described by the extended Drude dielectric function. At zero momentum transfer, the resulting ELF exhibits good agreement with the previously reported results. The ELF, obtained by the extended Drude model, displays a realistic behavior over the Bethe ridge. It is observed that the induced potential relies on the heavy ion velocity and charge state q. Further, the numerical results show that the induced potential for neutral H, as projectile, dominates when the heavy ion velocity is less

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Determination of moisture content in some materials using linear attenuation coefficient
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Multi – Linear in Multiple Nonparametric Regression , Detection and Treatment Using Simulation
...Show More Authors

             It is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the

... Show More
View Publication Preview PDF
Crossref