Preferred Language
Articles
/
5UJv1JkBMeyNPGM3QLi5
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain programming utilizing robustness and different devices. The blockchain based mix is currently days utilized for e-administrations and military applications for the noticeable security based applications. To work with the high performance approaches and algorithms, the blockchain technology is quite prominent and used in huge performance aware patterns whereby the need to enforce the security is there. The work integrates the usage patterns of blockchain technologies so that the overall security and integrity can be improved in which there is immutability and strength based algorithms for enforce the security measures.

Crossref
View Publication
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
A Visual Interface Design for Evaluating the Quality of Google Map Data for some Engineering Applications
...Show More Authors

Today, there are large amounts of geospatial data available on the web such as Google Map (GM), OpenStreetMap (OSM), Flickr service, Wikimapia and others. All of these services called open source geospatial data. Geospatial data from different sources often has variable accuracy due to different data collection methods; therefore data accuracy may not meet the user requirement in varying organization. This paper aims to develop a tool to assess the quality of GM data by comparing it with formal data such as spatial data from Mayoralty of Baghdad (MB). This tool developed by Visual Basic language, and validated on two different study areas in Baghdad / Iraq (Al-Karada and Al- Kadhumiyah). The positional accuracy was asses

... Show More
View Publication
Publication Date
Sun Jul 20 2025
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using a 3D Chaotic Dynamic System as a Random Key Generator for Image Steganography
...Show More Authors

In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Free Vibration Analysis for Dynamic Stiffness Degradation of Cracked Cantilever Plate
...Show More Authors

 

In the present work a dynamic analysis technique have been developed to investigate and characterize the quantity of elastic module degradation of cracked cantilever plates due to presence of a defect such as surface of internal crack under free vibration. A new generalized technique represents the first step in developing a health monitoring system, the effects of such defects on the modal frequencies has been the main key quantifying the elasticity modulii due to presence any type of un-visible defect. In this paper the finite element method has been used to determine the free vibration characteristics for cracked cantilever plate (internal flaws), this present work achieved by different position of crack. Stiffness re

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
Dynamic TWGH: Client-Server Optimization for Scalable Combinatorial Test Suite Generation
...Show More Authors

To ensure that a software/hardware product is of sufficient quality and functionality, it is essential to conduct thorough testing and evaluations of the numerous individual software components that make up the application. Many different approaches exist for testing software, including combinatorial testing and covering arrays. Because of the difficulty of dealing with difficulties like a two-way combinatorial explosion, this brings up yet another problem: time. Using client-server architectures, this research introduces a parallel implementation of the TWGH algorithm. Many studies have been conducted to demonstrate the efficiency of this technique. The findings of this experiment were used to determine the increase in speed and co

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
The Computational Fluid Dynamic Simulations for Gangrene Disease in Diabetic Foot
...Show More Authors

The diabetic foot is considered one of the long term diabetes complications caused by a defect in blood vessel and nerve system. This requires dealing with diabetic foot with professional medical care, so as to prevent its development in advanced stages which could end to gangrene and amputation of the foot. This study has been initiated through follow-up of twelve patients with diabetes and the presence various occlusions in lower limb artery. One patient from them was chosen for investigation, this patient has stenosis in popliteal artery and presence multiple stenosis in superficial femoral artery. This study based on analysis present case of patient and prediction for progress stenosis in superficial femoral artery till arrive semi t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks
...Show More Authors

Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Some Estimation methods for the two models SPSEM and SPSAR for spatially dependent data
...Show More Authors

ABSTRUCT

In This Paper, some semi- parametric spatial models were estimated, these models are, the semi – parametric spatial error model (SPSEM), which suffer from the problem of spatial errors dependence, and the semi – parametric spatial auto regressive model (SPSAR). Where the method of maximum likelihood was used in estimating the parameter of spatial error          ( λ ) in the model (SPSEM), estimated  the parameter of spatial dependence ( ρ ) in the model ( SPSAR ), and using the non-parametric method in estimating the smoothing function m(x) for these two models, these non-parametric methods are; the local linear estimator (LLE) which require finding the smoo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref