Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sat Feb 08 2025
Journal Name
Al–bahith Al–a'alami
Foreign Propaganda in the Electronic Press about the Syrian Crisis A Comparative Study of the Sites of Russia Today and Alhurra - A research drawn from a Master Degree thesis
...Show More Authors

The research problem lies in the ambiguity of the usage of propaganda contents by two main media outlets (the Russian RT and American Alhurra) in their news coverage of the Syrian crisis through their websites and the methods used by them to convince users taking into account the mutual propaganda conflict between the United States and Russia in the war against Syria. The objectives of the research can be represented by the following: investigating the contents of American and Russian electronic propaganda towards Syrian crisis.
• Identifying the contents that received most of the coverage in the Syrian crisis by the two news outlets.
• Identifying the terms and phrases that have been most used by the websites of RT and Alhurr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
A Visual Interface Design for Evaluating the Quality of Google Map Data for some Engineering Applications
...Show More Authors

Today, there are large amounts of geospatial data available on the web such as Google Map (GM), OpenStreetMap (OSM), Flickr service, Wikimapia and others. All of these services called open source geospatial data. Geospatial data from different sources often has variable accuracy due to different data collection methods; therefore data accuracy may not meet the user requirement in varying organization. This paper aims to develop a tool to assess the quality of GM data by comparing it with formal data such as spatial data from Mayoralty of Baghdad (MB). This tool developed by Visual Basic language, and validated on two different study areas in Baghdad / Iraq (Al-Karada and Al- Kadhumiyah). The positional accuracy was asses

... Show More
View Publication
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 31 2024
Journal Name
Iraqi Geological Journal
Artificial Neural Network Application to Permeability Prediction from Nuclear Magnetic Resonance Log
...Show More Authors

Reservoir permeability plays a crucial role in characterizing reservoirs and predicting the present and future production of hydrocarbon reservoirs. Data logging is a good tool for assessing the entire oil well section's continuous permeability curve. Nuclear magnetic resonance logging measurements are minimally influenced by lithology and offer significant benefits in interpreting permeability. The Schlumberger-Doll-Research model utilizes nuclear magnetic resonance logging, which accurately estimates permeability values. The approach of this investigation is to apply artificial neural networks and core data to predict permeability in wells without a nuclear magnetic resonance log. The Schlumberger-Doll-Research permeability is use

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Reservoir Characterization of Lower Qamchuqa (Shu'aiba) Formation from the Well BH-86, Bai- Hassan Oil field, Northern Iraq
...Show More Authors

      The reservoir characterization of Lower Qamchuqa (Shu'aiba) Formation (Aptian) is studied at the well BH-86 of Bai- Hassan Oilfield in Kirkuk area, Northern Iraq. The lithological study (of 91 thin sections) revealed that the formation consists of shaly limestone, a thin bed of marl within the limestone, and dolomitic limestone. Four petrographic microfacies were noticed Lime mudstone microfacies, Dolomudstone microfacies, Lime wackestone microfacies, subdivided into benthonic foraminifera lime wackestone submicrofacies and bioclasts lime wackestone submicrofacies, and the last microfacies is the Lime packstone microfacies, which is subdivided into pelloidal lime packstone submicrofacies and Orbitolina lime packstone microfaci

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Item Difficulty and Item Discrimination Coefficient for School and College Ability Tests (SCAT) Advanced Form in Classical Test Theory (CTT) and Item Response Theory (IRT) and the Correlation among Them
...Show More Authors

Item Difficulty and Item Discrimination Coefficient for School and College Ability Tests (SCAT) Advanced Form in Classical Test Theory (CTT) and Item Response Theory (IRT) and the Correlation among Them Mohammad moqasqas Haifa T. Albokai Assistant Professor of Measurement and Evaluation Associate Professor of Measurement and Evaluation College of Education, Taibah University The aim of this study was to study the item difficulty and item discrimination of the SCAT (advance form) with CTT, and IRT, and to study the correlation among them. To do this, the researchers used the data of their previous study, which conducted in (2011). It consisted of (3943) subject. Then, they used two-statistical programs (TAP, Bilog-MG-3) to obtain the item

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 08 2025
Journal Name
Sciences Journal Of Physical Education
Perceived organizational support and its relationship to the cognitive competence of the Iraqi National Olympic Committee from the point of view of members of the Olympic sports federations in Iraq
...Show More Authors

View Publication
Publication Date
Sat Feb 08 2025
Journal Name
Journal Mustansiriyah Of Sports Science
Relationship between Cognitive style (risk taking VS Cautiousness) and performance of some ring skills for third stage female students in College of Physical Education and Sport Sciences / University of Baghdad
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The use of the methods of the lower squares and the smaller squares weighted in the estimation of the parameters and design of the sample acceptance schemesFor general exponential distribution
...Show More Authors

The acceptance sampling plans for generalized exponential distribution, when life time experiment is truncated at a pre-determined time are provided in this article. The two parameters (α, λ), (Scale parameters and Shape parameters) are estimated by LSE, WLSE and the Best Estimator’s for various samples sizes are used to find the ratio of true mean time to a pre-determined, and are used to find the smallest possible sample size required to ensure the producer’s risks, with a pre-fixed probability (1 - P*). The result of estimations and of sampling plans is provided in tables.

Key words: Generalized Exponential Distribution, Acceptance Sampling Plan, and Consumer’s and Producer Risks

... Show More
View Publication Preview PDF
Crossref