Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Workplace Respect on Employee Performance: A Survey Study in Abu Ghraib Dairy Factory
...Show More Authors

This paper aims to explain the effect of workplace respect on employee performance at Abu Ghraib Dairy Factory (AGDF). For achieving the research aim, the analytical and descriptive approach was chosen using a questionnaire tool for collecting data.  It covers 22 items; ten of them for the workplace respect variable and twelve items for the employee performance variable. The research population involved human resources who work at AGDF in Baghdad within two administrative levels (top and middle). We conducted a purposive stratified sample approach. It was distributed 70 questionnaire forms, and 65 forms were received. However, six of them had missing data and did not include in the final data analysis. The main results are t

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Malaysian Journal Of Nursing
Experiences of Nurses in Providing Care for Patients on the Cancer Journey: A Cross-Sectional Survey
...Show More Authors

View Publication
Scopus (3)
Crossref (7)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Influence of Optical Fiber Diameters on the Performance of Surface Plasmon Resonance Sensor
...Show More Authors

In this research, a sensor for chemical solutions was designed and formed using optical fiber-based on a surface Plasmon resonance technology. A single-mode optical fiber with three different diameters (25, 45 and 65) µm was used, respectively.  The second layer of the low refractive fiber was replaced by gold, which was electrically deposited at 40 µm thickness. For each of the three types of optical fiber, different saline concentrations (different index of refraction) were used to evaluate the performance of the refractive index sensor (chemical sensor) by measuring its sensitivity and resolutions. The highest values we could get for these two parameters were 240mm/RIU, and 6*10-5 RIU respectively, when the diameter of a

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
The Role Of Atheism In The Demolition Of Societal Security
...Show More Authors

The enemies of religion are still following the approach of undermining the Islamic faith in various ways through the diversity of methods of smear campaigns by raising suspicions to obliterate the Islamic identity and threaten security and stability of social life under the Islamic religion in Islamic societies, as we find that they have employed the doctrine of atheistic thought in order to distance people from the path of truth, distort the features of religion, destabilize psychological security and family stability, and thus destroy societal security by questioning the tolerant faith at times, and by raising suspicions at other times.

Hence, this research came to review the legal duty that requires Islamic scholars to protec

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Predicting Social Security Fund compensation in Iraq using ARMAX Model
...Show More Authors

Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
The Effective Width in Composite Steel Concrete Beams at Ultimate Loads
...Show More Authors

A composite section is made up of a concrete slab attached to a steel beam by means of shear connectors. Under positive and negative bending moment, part of the slab will act as a flange of the beam, resisting the longitudinal compression or tension force. When the spacing between girders becomes large, it is evident that the simple beam theory does not strictly apply because the longitudinal stress in the flange will vary with distance from the girder web, the flange being more highly stressed over the web than in the extremities. This phenomenon is termed "shear lag". In this paper, a nonlinear three-dimensional finite element analysis is employed to evaluate and determine the actual effective slab width of the composite steel-concrete

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
College Of Islamic Sciences
The formula is effective in Surat Nisa: (A study of gramophone)
...Show More Authors

The formula is effective in Surat Nisa
(A study of gramophone)

in the name of o Allah the Merciful
Praise be to Allah, Lord of the Worlds, and prayers and peace be upon the Seal of the Prophets and Messengers. The envoy is a mercy to the worlds Muhammad Sadiq Al - Amin and to the pure and good companions of the Tayyibites.
The formula of the morphological formulas, which have diverged from other meanings, whether lexicon or contextual and what this formula contains many meanings (effective source) and (effective in the sense of effective) and (effective sense reactor) and (effective sense) and ( (F) in the sense of a similar character) and ((the name of the) (collect). This was dealt with in the formula in Surat al-Nisaa

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Thu Aug 16 2018
Journal Name
Indian Journal Of Agricultural Research
Effect of seed priming on grain growth rate and effective filling period in bread wheat (Triticum aestivum L.) cultivars
...Show More Authors

A field experiment was conducted during winter, 2015-16 with the objective to investigate the effect of bread wheat cultivars (Abu-Ghraib3, Ibaa99, and Alfeteh) and seed priming 100, 100, 150 mg L-1 of benzyl adenine, salicylic acid, gibberellic acid (GA3), respectively, ethanolic extract of Salix Sp., water extract of Glycyrrhiza glabra and distilled water (control) on grain growth rate (GGR), effective filling period (EFP) and accelerating of physiological maturity. Randomized complete block design with three replicates was applied. GA3×Ibaa99 surpassed others in grain yield (7.432 tonne ha-1) when gave the highest grain weight (45.13 mg grain-1) and GGR (1.5 mg grain-1 day-1) with the fastest time to start and end EFP (5 and 34 days), w

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Ruling on questioning children by the security authorities: (Comparative Study between Sharia and Law)
...Show More Authors

Some of the issues that have become common in our society recently after the Americans entered our country and were rubbed by some security agencies: obtaining some information from children, and the serious consequences that may lead to the lives of innocent people, became common interrogation of some security agencies and rely on their words.
There are significant cases where their testimony needs to be heard, such as their presence in some places where incidents are not witnessed by others, such as schools or being witnesses to certain crimes.
I saw the study of this case in the light of Sharia and law

View Publication Preview PDF