Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Tue Aug 05 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of thermocycling on microleakage analysis of bulk filled base composite in comparison to incrementally placed nanohybrid composite in class II MOD restorations (An in vitro study)
...Show More Authors

Background: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The Mathematical construct and its relationship with effective mathematical operations in both sides of the brain among students of the Department of Mathematics at the Colleges of Education and Basic Education
...Show More Authors

The current research aims to identify: 1. The level of mathematical construct among the Department of Mathematics students in the colleges of education and basic education. 2. The level of effective mathematical operations in both sides of the brain at the Department of Mathematics students in the colleges of education and basic education. 3. The strength and direction of the correlation between the mathematical construct and effective mathematical operations on both sides of the brain at the Department of Mathematics students in the colleges of Education and Basic Education. To investigate the research objectives, the researcher formulated zero-main hypothesis for each aim and from the same hypothesis, three sub-zero hypotheses are deri

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Creative accounting practices for supply contracts and the role of internal audit in reducing them: An exploratory study on a sample of industrial companies in Iraq
...Show More Authors

Abstract:

                The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.

A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Research In Medical And Dental Science
Efficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)
...Show More Authors

Efficacy of Varnishes with: Bioactive Glass, Recaldent Technology and Silver Diamine Fluoride in Comparison with Sodium Fluoride on Tooth Surface Micro-hardness (an In Vitro Study)

View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The role of GRI standards in reporting the dimensions of sustainable development - An applied study in a number of local companies on the Iraq Stock Exchange
...Show More Authors

The current research aims to shed light on the Global Reporting Initiative (GRI), which helps to report financial and non-financial information by economic units in general and listed on the Iraq Stock Exchange in particular. The research was based on a main premise that apply the criteria of the Global Reporting Initiative (GRI) would provide useful information to users to help them make appropriate decisions. To achieve the goal of the research, the descriptive analysis method was used, and quantitative analysis was used. At the level of the descriptive analysis method, a desk survey was conducted. As for the quantitative analysis, it relied on applied data through a questionnaire form (Questioners) as a research tool, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Estimating the impact of tax exemptions on achieving economic development in Iraq for the period (2015-2021): An Applied research in the General Authority for Taxes
...Show More Authors

Abstract

          The research aims to identify tax exemptions, their objectives and types, as well as to shed light on the concept of sustainable development, its objectives, dimensions and indicators (economic, social and environmental), as well as to analyze the relationship between tax exemptions and economic development, in addition to measuring and analyzing the impact of tax exemptions on economic development in Iraq for the period ( 2015 - 2021) using the NARDL model. The research problem centers on the fact that failure to employ financial policy tools correctly led to a weakness in achieving economic justice, which leads to a failure to improve social welfar

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Geological Journal
Electrical Resistivity Synthetic Modeling and Field Survey for Subsurface Features Investigation of the Borsippa Archaeological Site, Babylon Governorate, Middle Iraq
...Show More Authors

The selection of proper field survey parameters of electrical resistivity can significantly provide efficient results within a reasonable time and cost. Four electrode arrays of 2D Electric Resistivity Imaging (ERI) surveys were applied to characterize and detect subsurface archaeological bodies and to determine the appropriate array type that should be applied in the field survey. This research is to identify the subsurface features of the Borsippa archaeological site, Babylon Governorate, Middle Iraq. Synthetic modeling studies were conducted to determine the proper array and parameters for imaging the shallow subsurface features or targets. The efficiency of many array types has been tested for the detection the buried archaeolog

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A SURVEY OF ECTO AND ENDO-PARASITES OF HOUSE MOUSE MUS MUSCULUS LINNAEUS, 1758 OF ERBIL CITY, KURDISTAN REGION, IRAQ
...Show More Authors

In the present survey 18 species of endo and ecto-parasites were recorded during the examination of 50 Mus musculus (Linnaeus, 1758) among 10 localities in Erbil city, of which 7 species were protozoan and as follows : Chilomastix bettencourti (da Fonseca 1915)82%; Giardia muris (Filice, 1952) 68%; Tritrichomonas muris (Grassi,1879)36%; Entamoeba histolytica (Schaudinn,1903) 24%; Entamoeba coli (Grassi,1879)32%; Eimeria sp. 28% and Trypanosoma musculi (Kendall,1906)2%; and 8 species were helminthes as follows: 4 Cestodes: Rodentolepis nana (von Siebold, 1852) 8%; Hymenolepis diminuta (Rudolphi, 1819)2%; larval stage of Echinococcus granulosus (Batsch, 1786)8%, Cysticercus fasciolaris (Rudolphi, 1808)6%, 4 Nematodes: Aspiculuris tetrapter

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
View Publication
Crossref