Preferred Language
Articles
/
OxaTwosBVTCNdQwCFtyN
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance penalty. Due to the massive calculations required by conventional public-key and secret encryption methods, information security in this limited context calls for light encryption techniques. In many applications involving sensor networks, security is a crucial concern. On the basis of traditional cryptography, a number of security procedures are created for wireless sensor networks. Some symmetric-key encryption techniques used in sensor network setups include AES, RC5, SkipJack, and XXTEA. These algorithms do, however, have several flaws of their own, including being susceptible to chosen-plaintext assault, brute force attack, and computational complexity.

Crossref
View Publication
Publication Date
Sun Jun 21 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Nanotechnology-Based Topical Drug Delivery Systems for Management of Dandruff and Seborrheic Dermatitis: An overview
...Show More Authors

Dandruff and seborrheic dermatitis (SD) are common skin disorders affecting the scalp and extending to other body sites in the case of SD. They are associated with pruritus and scaling, causing an esthetical disturbance in the population affected.   Treatment of such conditions involves using a variety of drugs for long terms, thus optimizing drug formulation is essential to improve therapeutic efficacy and patient compliance. Conventional topical formulations like shampoos and creams have been widely used but their use is associated with disadvantages. To overcome such effects, novel topical nanotechnology-based formulations are currently under investigation. In the following article, we highlight recently published formulatio

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
On Bayesian Estimation of System Reliability in Stress – Strength Model Based on Generalized Inverse Rayleigh Distribution
...Show More Authors
Abstract<p>The parameter and system reliability in stress-strength model are estimated in this paper when the system contains several parallel components that have strengths subjects to common stress in case when the stress and strengths follow Generalized Inverse Rayleigh distribution by using different Bayesian estimation methods. Monte Carlo simulation introduced to compare among the proposal methods based on the Mean squared Error criteria.</p>
View Publication
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Swarm And Evolutionary Computation
A new multi-objective evolutionary framework for community mining in dynamic social networks
...Show More Authors

View Publication
Scopus (26)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Wireless Communications And Mobile Computing
Corrigendum to “Developing a Video Buffer Framework for Video Streaming in Cellular Networks”
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (19)
Crossref (13)
Scopus Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
An Environmental Study on Phytoplankton (Diatoms) in Al-Yusifiya River, Iraq
...Show More Authors

An environmental study conducted on diatoms in Al Yusifiya river beyond its branching from Euphrates river. Four sites were selected along the river for the period from march 2013 to September 2013. The present study involved the measurement of physicochemical parameters, also the qualitative and quantities of diatoms. The studied parameters values ranged as follows: 19-44Cº and 16-30 Cº for air and water temperature respectively, 6.9-8.7, 595-1248 µS/cm, 6.4-8.0 mg/l for pH, electric conductivity and dissolved oxygen respectively. A total of 74 taxa were recorded for diatoms, where the pinnate diatom was the predominant and recorded 64 taxa while 10 taxa for centric diatoms. The total number of diatoms was 1197.55*104 cell /l. The tota

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Optimized Zero and First Order Design of Micro Geodetic Networks
...Show More Authors

Precision is one of the main elements that control the quality of a geodetic network, which defines as the measure of the network efficiency in propagation of random errors. This research aims to solve ZOD and FOD problems for a geodetic network using Rosenbrock Method to optimize the geodetic networks by using MATLAB programming language, to find the optimal design of geodetic network with high precision. ZOD problem was applied to a case study network consists of 19 points and 58 designed distances with a priori deviation equal to 5mm, to determine the best points in the network to consider as control points. The results showed that P55 and P73 having the minimum ellipse of error and considered as control points. FOD problem was applie

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref