Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Hydrogen gas sensing based on nanocrystalline SnO2 thin films operating at low temperatures
...Show More Authors

View Publication
Scopus (43)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Using Fuzzy Games Theory to Determine the optimal Strategy for The Mobile Phone Networks in The Baghdad And Basra governorates
...Show More Authors

      The objective of this research is employ the special cases of  function  trapezoid in the composition of fuzzy sets to make decision within the framework of the theory of games traditional to determine the best strategy for the mobile phone networks in the province of  Baghdad and Basra, has been the adoption of different periods of the  functions belonging to see the change happening in the matrix matches and the impact  that the strategies  and decision-making  available to each player and the impact on  societ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 12 2024
Journal Name
Semiconductor Physics, Quantum Electronics And Optoelectronics
Numerical study of single-layer and interlayer grating polarizers based on metasurface structures for quantum key distribution systems
...Show More Authors

Polarization is an important property of light, which refers to the direction of electric field oscillations. Polarization modulation plays an essential role for polarization encoding quantum key distribution (QKD). Polarization is used to encode photons in the QKD systems. In this work, visible-range polarizers with optimal dimensions based on resonance grating waveguides have been numerically designed and investigated using the COMSOL Multiphysics Software. Two structures have been designed, namely a singlelayer metasurface grating (SLMG) polarizer and an interlayer metasurface grating (ILMG) polarizer. Both structures have demonstrated high extinction ratios, ~1.8·103 and 8.68·104 , and the bandwidths equal to 45 and 55 nm for th

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed May 31 2017
Journal Name
Journal Of Engineering
Construction Policies on Campus An Analytical Study of the Policy of Construction Planning on Kufa Campus
...Show More Authors

     University Campuses, as any lively physical entity, is subject to continuous variation due to . growth, development and change. This reality covers the existing or futuristic additives or  additions, consecutively these changes may have a strong sensation of disorientation as a result of formatic changes in buildings, or in movement paths. And it epitomized the research problem to "the need for knowledge to clarify the impact of intellectual and executive policy in achieving coherence, functional and space organization of the elements of the university urban environment and in the stages of future growth and change,"  the search targeted "to highlight the study of constraction politics on campus Bmqomad

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact Of Adopting The Social Responsibility On Marketing Performance An Applied Study on NAFTAL Company
...Show More Authors

This research paper aims at studying the effect of adopting the corporate social responsibility on marketing performance indicators, where the study adopted the descriptive method for theoretical concepts, in addition to the statistical approach by using the SPSS v25 program to analyze the questionnaire and test the hypotheses of the study. The results showed that there is a positive correlation between social responsibility and marketing performance indicators, and the study found that it is better for NAFTAL Company to mix the environmental and social responsibilities in order to improve its marketing performance. Also, the study recommended that Naftal should adopt the four responsibilities equally, correctly and make its work

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 03 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Enhancing smart home energy efficiency through accurate load prediction using deep convolutional neural networks
...Show More Authors

The method of predicting the electricity load of a home using deep learning techniques is called intelligent home load prediction based on deep convolutional neural networks. This method uses convolutional neural networks to analyze data from various sources such as weather, time of day, and other factors to accurately predict the electricity load of a home. The purpose of this method is to help optimize energy usage and reduce energy costs. The article proposes a deep learning-based approach for nonpermanent residential electrical ener-gy load forecasting that employs temporal convolutional networks (TCN) to model historic load collection with timeseries traits and to study notably dynamic patterns of variants amongst attribute par

... Show More
View Publication
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Promising Gains of 5G Networks with Enhancing Energy Efficiency Using Improved Linear Precoding Schemes
...Show More Authors

Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Spe Europec Featured At 81st Eage Conference And Exhibition
Development of Artificial Neural Networks and Multiple Regression Analysis for Estimating of Formation Permeability
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref