At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad
... Show MoreFour new copolymers were synthesized from reaction of bis acid monomer 3-((4-carboxyphenyl) diazenyl)-5-chloro-2-hydroxybenzoic acid with five diacidhydrazide in presence of poly phosphoric acid. The resulted monomers and copolymers have been characterized by FT-IR, 1H-NMR, 13C-NMR spectroscopy as well as EIMs technique. The number averages of molecular weights of the copolymers are between 4822 and 9144, and their polydispersity indexes are between 1.02 and 2.15. All the copolymers show good thermal stability with the temperatures higher than 305.86 C when losing 10% weight under nitrogen. The cyclic voltammetry (CV) measurement and the electrochemical band gaps (Eg) of these copolymers are found below 2.00 ev.
Some degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f
Baghdad city has been faced numerous issues related to freshwater environment deteriorations due to many reasons, mainly was the discharge of wastewater without adequate treatment. Al- Rustamiya Wastewater Treatment Plant (WWTP) have been constructed among many plants in Baghdad city to reduce the amount of wastewater discharged into natural environment and its subsequent adverse effects. This study was conducted to evaluate the performance of the plant which consist of a conventional activated sludge (CAS) and sequencing batch reactors (SBR) systems as secondary treatment units and its ability to meet Iraqi specifications. A reliability level determination and analysis also were conducted to find the plant's stability and its capabi
... Show MoreThe electrospun nanofibers membranes (ENMs) have gained great attention due to their superior performance. However, the low mechanical strength of ENMs, such as the rigidity and low strength, limits their applications in many aspects which need adequate strength, such as water filtration. This work investigates the impact of electrospinning parameters on the properties of ENMs fabricated from polyacrylonitrile (PAN) solved in N, N-Dimethylformamide (DMF). The studied electrospinning parameters were polymer concentration, solution flow rate, collector rotating speed, and the distance between the needle and collector. The fabricated ENMs were characterized using scanning electron microscopy (SEM) to understand the surface morphology and es
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe meniscus has a crucial function in human anatomy, and Magnetic Resonance Imaging (M.R.I.) plays an essential role in meniscus assessment. It is difficult to identify cartilage lesions using typical image processing approaches because the M.R.I. data is so diverse. An M.R.I. data sequence comprises numerous images, and the attributes area we are searching for may differ from each image in the series. Therefore, feature extraction gets more complicated, hence specifically, traditional image processing becomes very complex. In traditional image processing, a human tells a computer what should be there, but a deep learning (D.L.) algorithm extracts the features of what is already there automatically. The surface changes become valuable when
... Show More