Future generations of wireless networks are expected to heavily rely on unmanned aerial vehicles (UAVs). UAV networks have extraordinary features like high mobility, frequent topology change, tolerance to link failure, and extending the coverage area by adding external UAVs. UAV network provides several advantages for civilian, commercial, search and rescue applications. A realistic mobility model must be used to assess the dependability and effectiveness of UAV protocols and algorithms. In this research paper, the performance of the Gauss Markov (GM) and Random Waypoint (RWP) mobility models in multi-UAV networks for a search and rescue scenario is analyzed and evaluated. Additionally, the two mobility models GM and RWP are described in depth, together with the movement patterns they are related with. Furthermore, two-simulation scenarios conduct with help of an NS-3 simulator. The first scenario investigates the effect of UAV Speed by varying it from 10 to 50 m/s. the second scenario investigates the effect of the size of the transmitting packet by varying it from 64 to 1024 bytes. The performance of GM and RWP was compared based on packet delivery ratio (PDR), goodput, and latency metrics. Results indicate that the GM model provides the highest PDR and lowest latency in such high mobility environments.
The process of digital transformation is considered one of the most influential matters in circulation at the present time, as it seeks to integrate computer-based technologies into the public services provided by companies or institutions. To achieve digital transformation, basics and points must be established, while relying on a set of employee skills and involving customers in developing this process. Today, all governments are seeking electronic transformation by converting all public services into digital, where changes in cybersecurity must be taken into account, which constitutes a large part of the priorities of nations and companies. The vulnerability to cyberspace, the development of technologies and devices, and the use
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreHousing finance is one of the main components of housing, and it is relied upon to help families buy, build, add building, and housing improve. Accordingly, different countries all over the world set policies and strategies for the purpose of organizing and developing the financial sector to solve quantitative and qualitative housing problems.
This research aims to identify housing finance policies and strategies in Iraq and Baghdad governorate.
The most prominent sources of housing financing are the Real Estate Bank and the Housing Fund, and accordingly the focus has been on the role of these two institutions in filling
... Show More<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreIn this paper, the deterministic and the stochastic models are proposed to study the interaction of the Coronavirus (COVID-19) with host cells inside the human body. In the deterministic model, the value of the basic reproduction number determines the persistence or extinction of the COVID-19. If , one infected cell will transmit the virus to less than one cell, as a result, the person carrying the Coronavirus will get rid of the disease .If the infected cell will be able to infect all cells that contain ACE receptors. The stochastic model proves that if are sufficiently large then maybe give us ultimate disease extinction although , and this facts also proved by computer simulation.
In this work, polyvinylpyrrolidone (PVP)/ Multi-walled carbon nanotubes (MWCNTs) nanocomposites were prepared with two concentrations of MWCNTs by casting method. Morphological, structural characteristics and electrical properties were investigated. The state of MWCNTs dispersion in a PVP matrix was indicated by Field Effect-Scanning Electron Microscopy (FESEM) which showed a uniform dispersion of MWCNTs within the PVP matrix. X-ray Diffraction (XRD) indicate strong bonding of carbonyl groups of PVP composite chains with MWCNTs. Fourier transfer infrared (FTIR) studies shows characteristics of various stretching and bending vibration bands, as well as shifts in some band locations and intensity changes in others. Hall effect was stu
... Show MoreIn this work, polyvinylpyrrolidone (PVP)/ Multi-walled carbon nanotubes (MWCNTs) nanocomposites were prepared with two concentrations of MWCNTs by casting method. Morphological, structural characteristics and electrical properties were investigated. The state of MWCNTs dispersion in a PVP matrix was indicated by Field Effect-Scanning Electron Microscopy (FESEM) which showed a uniform dispersion of MWCNTs within the PVP matrix. X-ray Diffraction (XRD) indicate strong bonding of carbonyl groups of PVP composite chains with MWCNTs. Fourier transfer infrared (FTIR) studies shows characteristics of various stretching and bending vibration bands, as well as shifts in some band locations and intensity changes in others. Hall effect was studied
... Show More