At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreThis paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.
The measurement of natural radioactivity in a given region or country is essential to provide a reference base-line map to follow up a possible variation in future. In order to perform such measurement, the natural radioactivity was measured in different locations. The locations (50 sites) were distributed over Al-Jabal Al-Gharbi Mountain, starting from the city Al-Azeeziah in the eastern part to Wazen on the Tunisian border in the west. The measurements showed obvious variation from one site to another. The levels were fluctuating from (12.8 counts/minute) in Bir-Ayad to (45.7 counts/minute) in Gherian.
In order to investigate the cause for such variation, samples were collected from (27) sites for detailed study. The levels of natur
SJ Mohammed, AA Noaimi, KE Sharquie, JM Karhoot, MS Jebur, JR Abood, A Al-Hamadani, Al-Qadisiyah Medical Journal, 2015 - Cited by 20
Due to the spread of insect pests that destroys the crops belonging to the Cucurbitaceae family and led to deterioration in crop productivity in Iraq due to various reasons, the most important of which is Climate fluctuation and extreme weather events have a major impact on this problem. So, this paper was proposed to identify those species pests and prevalence. Insects were collected during the period from March 1. 2022 to October 30, 2022 from the several regions of Iraq, including: Baghdad, Babylon, Basra, Karbala, Wasit, Diyala, Saladin, and Duhok Provinces. The results showed 19 important species under 17 genera with 13 families, and five orders. The most common synonyms and dist
To assess the biochemical, mechanical and structural characteristics of retained dentin after applying three novel bromelain‑contained chemomechanical caries removal (CMCR) formulations in comparison to the conventional excavation methods (hand and rotary) and a commercial papain‑contained gel (Brix 3000). Seventy‑two extracted permanent molars with natural occlusal carious lesions (score > 4 following the International Caries Detection and Assessment System (ICDAS‑II)) were randomly allocated into six groups (n = 12) according to the excavation methods: hand excavation, rotary excavation, Brix 3000, bromelain‑contained gel (F1), bromelain‑chloramine‑T (F2), and bromelain chlorhexidine gel (F3). The superficial and deepe
... Show More