Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Design a system for an approved video copyright over cloud based on biometric iris and random walk generator using watermark technique
...Show More Authors

View Publication
Scopus (50)
Crossref (11)
Scopus Crossref
Publication Date
Mon Aug 05 2024
Journal Name
Food And Bioprocess Technology
Development of an Innovative Reinforced Food Packaging Film Based on Corn Starch/Hydroxypropyl Methylcellulose/Nanocrystalline Cellulose Incorporated with Nanogel Containing Quercetin
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Dec 11 2020
Journal Name
2020 Ieee 8th Conference On Systems, Process And Control (icspc)
A Survey of Different DC Faults in a Solar Power System
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Natural radioactivity survey in Al-Jabal Al-Gharbi Mountain Region Libya
...Show More Authors

The measurement of natural radioactivity in a given region or country is essential to provide a reference base-line map to follow up a possible variation in future. In order to perform such measurement, the natural radioactivity was measured in different locations. The locations (50 sites) were distributed over Al-Jabal Al-Gharbi Mountain, starting from the city Al-Azeeziah in the eastern part to Wazen on the Tunisian border in the west. The measurements showed obvious variation from one site to another. The levels were fluctuating from (12.8 counts/minute) in Bir-Ayad to (45.7 counts/minute) in Gherian.
In order to investigate the cause for such variation, samples were collected from (27) sites for detailed study. The levels of natur

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Al-qadisiyah Medical Journal
A survey of dermatophytes isolated from Iraqi patients in Baghdad City
...Show More Authors

SJ Mohammed, AA Noaimi, KE Sharquie, JM Karhoot, MS Jebur, JR Abood, A Al-Hamadani, Al-Qadisiyah Medical Journal, 2015 - Cited by 20

View Publication
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Survey of histeridae beetles with forensic important in Kerbela Province-Iraq
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Survey of Insects Associated with some Species of Cucurbitaceae in Iraq
...Show More Authors
Abstract<p>Due to the spread of insect pests that destroys the crops belonging to the Cucurbitaceae family and led to deterioration in crop productivity in Iraq due to various reasons, the most important of which is Climate fluctuation and extreme weather events have a major impact on this problem. So, this paper was proposed to identify those species pests and prevalence. Insects were collected during the period from March 1. 2022 to October 30, 2022 from the several regions of Iraq, including: Baghdad, Babylon, Basra, Karbala, Wasit, Diyala, Saladin, and Duhok Provinces. The results showed 19 important species under 17 genera with 13 families, and five orders. The most common synonyms and dist</p> ... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Aug 19 2024
Journal Name
Scientific Reports
An in-vitro evaluation of residual dentin retained after using novel enzymatic-based chemomechanical caries removal agents
...Show More Authors

To assess the biochemical, mechanical and structural characteristics of retained dentin after applying three novel bromelain‑contained chemomechanical caries removal (CMCR) formulations in comparison to the conventional excavation methods (hand and rotary) and a commercial papain‑contained gel (Brix 3000). Seventy‑two extracted permanent molars with natural occlusal carious lesions (score > 4 following the International Caries Detection and Assessment System (ICDAS‑II)) were randomly allocated into six groups (n = 12) according to the excavation methods: hand excavation, rotary excavation, Brix 3000, bromelain‑contained gel (F1), bromelain‑chloramine‑T (F2), and bromelain chlorhexidine gel (F3). The superficial and deepe

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref