Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sun Oct 06 2024
Journal Name
International Journal Of Advances In Engineering And Management (ijaem)
The makers of sedition in light of Chapters (Al-Baqarah and Yusuf)/An objective study
...Show More Authors

The makers of strife exist in every era and time. They differ in how these temptations are created and the methods used in doing so. In our modern era, they are more; This is due to the presence of information technology and its easy availability at their fingertips, as well as the spread of social networking sites, which are rapidly spreading among ignorant groups and groups that are deficient in their use. Which led the makers of sedition to exploit these matters and create various temptations and spread them among peoples and societies. Today, we cannot predict the future of humanity in light of this huge amount of temptation. What the Holy Qur’an mentioned about the types of temptations in its noble verses and their embodiment in seve

... Show More
Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role of higher Education Institutes in restricting Administrative and Financial Corruption: An Analytic Reading
...Show More Authors

Corruption, in all its categories and forms, is regarded as the nowadays virus which has greatly spread in most institutes and society, a matter that cause a great waste of resources.

      According to the reports of international transparency Institute, Iraq is regarded as one of the greatest countries in corruption.

      Regardless of the reasons and forms of corruption, the retreat in work – values and ethics are the main reasons behind that.

      Being the main source of providing qualified staff "educators" for the working market, the high education institutes face great challenges in standing against corruption inside and outside

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Australian Dental Journal
Debonding of LDSVs utilising Er,Cr:YSGG laser irradiation with fractional technique: an in vitro study
...Show More Authors

Scopus (4)
Scopus
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
An Epidemiological, Diagnostic, and Therapeutic Study of the Leishmania tropica Parasite in Iraq’s Anbar Province
...Show More Authors

This paper involved the registration of 1,936 cases of infection of the Leishmania tropica parasite observed at hospitals and health centers in Ramadi, Fallujah, Baghdadi, and Hit during 2017. The results revealed that the highest rates of infection were found in Ramadi and Fallujah. The 1-10 years age group recorded the highest rate at 35.5%. There was no significant difference (p ≥ 0.05) between the sexes. December and January saw the highest rate of infection, where the rate in rural townships was found to be 65.5%, higher than in urban regions which saw a rate of 34.4%. Facial lesions were the most prominent area of infection, recorded at a rate of 41.3%. The study also included an examination of 180 rodents (94 mice and 86 black r

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
CVOTING: An Anonymous Ballot E-Voting System
...Show More Authors

One of the concerns of adopting an e-voting systems in the pooling place of any critical elections is the possibility of compromising the voting machine by a malicious piece of code, which could change the votes cast systematically. To address this issue, different techniques have been proposed such as the use of vote verification techniques and the anonymous ballot techniques, e.g., Code Voting. Verifiability may help to detect such attack, while the Code Voting assists to reduce the possibility of attack occurrence. In this paper, a new code voting technique is proposed, implemented and tested, with the aid of an open source voting. The anonymous ballot improved accordingly the paper audit trail used in this machine. The developed system,

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Diabetes & Metabolic Syndrome: Clinical Research & Reviews
Rhabdomyolysis; is it an overlooked DKA complication
...Show More Authors

View Publication
Scopus (4)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu May 05 2022
Journal Name
Karbala International Journal Of Modern Science
An economical source for peroxidase: maize cobs
...Show More Authors

According to the current situation of peroxidase (POD), the relevant studies on this enzyme indicated its importance as a tool in clinical biochemistry and different industrial fields. Most of these studies used the fruits and vegetables as source of this enzyme. So that in order to couple the growing requirements for POD with the recent demands for reduc-ing disposal volume by recycling the plant waste, the aim of the present study was to extract POD through management of municipal bio-waste of Iraqi maize species. A simple, green and economical method was used to extract this enzyme. Our results revealed that maize cobs are rich sources of POD, where the activity of this enzyme was found to be 7035.54 U/g of cobs. In pilot experiments thi

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 01 2017
Journal Name
2017 Annual Conference On New Trends In Information & Communications Technology Applications (ntict)
An efficient color quantization using color histogram
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Thu Sep 16 2021
Journal Name
International Journal Of Clinical Practice
An overview of post‐COVID‐19 complications
...Show More Authors

View Publication
Scopus (5)
Crossref (7)
Scopus Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrofacies Characterization of an Iraqi Carbonate Reservoir
...Show More Authors

 

Predicting peterophysical parameters and doing accurate geological modeling which are an active research area in petroleum industry cannot be done accurately unless the reservoir formations are classified into sub-groups. Also, getting core samples from all wells and characterize them by geologists are very expensive way; therefore, we used the Electro-Facies characterization which is a simple and cost-effective approach to classify one of Iraqi heterogeneous carbonate reservoirs using commonly available well logs.

The main goal of this work is to identify the optimum E-Facies units based on principal components analysis (PCA) and model based cluster analysis(MC

... Show More
View Publication Preview PDF