Preferred Language
Articles
/
UhauZIkBVTCNdQwCaonr
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 500 per frame, and each number value reaches more than 1000 to be used or switched when needed. The method also provides some difficulty in guessing the keys from the transmitted video and the reason for the development and emergence of many communication programs Viber, WhatsApp, and other programs, enabling to use the proposed method in these programs.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 29 2013
Journal Name
Wireless Personal Communications
A Low Cost Route Optimization Scheme for Cluster-Based Proxy MIPv6 Protocol
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Applied Soft Computing
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks
...Show More Authors

Scopus (246)
Crossref (202)
Scopus Clarivate Crossref
Publication Date
Sat Sep 27 2014
Journal Name
Soft Computing
Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks
...Show More Authors

View Publication
Scopus (30)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Swarm And Evolutionary Computation
Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks
...Show More Authors

Scopus (169)
Crossref (138)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Preparation of Posaconazole Nanosponges for Improved Topical Delivery System
...Show More Authors

The objective of the current research was to develop the posaconazole (PCZ) loaded NS into the carbopol 934 polymeric gel for prolonged drug release and improved topical delivery; seven different nanosponge formulations of PCZ were formulated using the emulsion solvent diffusion method using various amounts of polymer (ethylcellulose, EC). The aqueous and dispersed phases were prepared using polyvinyl alcohol (PVA) and dichloromethane. The prepared nanosponges (NS) were studied for particle size, structural appearance, and in vitro drug release. Furthermore, the selected formula was formulated as hydrogel and was evaluated for physical characteristics, drug content, and in-vitro drug release. Morphological studies revealed irregular

... Show More
View Publication
Scopus (8)
Crossref (7)
Scopus Crossref
Publication Date
Sun Mar 29 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oxidation Desulphurization of Heavy Naphtha Improved by Ultrasound Waves
...Show More Authors

The oxidation desulphurization assisted by ultrasound waves was applied to the desulphurization of heavy naphtha. Hydrogen peroxide and acetic acid were used as oxidants, ultrasound waves as phase dispersion, and activated carbon as solid adsorbent. When the oxidation desulphurization (ODS) process was followed by a solid adsorption step, the performance of overall Sulphur removal was 89% for heavy naphtha at the normal condition of pressure and temperature. The process of (ODS) converts the compounds of Sulphur to sulfoxides/ sulfones, and these oxidizing compounds can be removed by activated carbon to produce fuel with low Sulphur content. The absence of any components (hydrogen peroxide, acetic acid, ultrasound waves and activated car

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Improving the efficiency and security of passport control processes at airports by using the R-CNN object detection model
...Show More Authors

The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of The College Of Education For Women
Popular Mobilization and human security In Local Society
...Show More Authors

The definition of the role of any institution in society is achieved through its objectives, The same is true for the military and how to deal with security threats in the humanitarian field ,Terrorism, which has almost replaced the traditional pattern of war, has waged a street war and intimidated individuals, families and society ,On the other hand, he found someone to meet him from a popular crowd of volunteers to defend their homeland from different sects, sects and religions,  Thus, our study will be exposed to the role of popular mobilization in human security from a sociological point of view in Samarra, a field study of 100 male and female respondents.

View Publication Preview PDF