Preferred Language
Articles
/
XBgvGJgBVTCNdQwC2rmr
Enhanced Security Taxonomy for Fog-Enabled VANETs: A Comprehensive Survey on Attacks, Challenges, Applications and Architectures
...Show More Authors

Vehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that classifies threats, attack vectors, and mitigation strategies across various applications and architectures. Additionally, this study outlines methods for secure data sharing, real-time authentication, and threat mitigation while evaluating emerging security frameworks. By highlighting the advantages of FC—such as localized data privacy management, mobility support, and real-time decision-making—this survey establishes a foundation for future research and innovation in developing secure, scalable, and robust VANET systems. The findings offer practical implications for designing next-generation ITS with enhanced security and operational efficiency.

Scopus Crossref
View Publication
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Dumping and Its Challenges in Extent of World Trade Organization "Models for selected Agricultural Goods"
...Show More Authors

The subject of dumping is considering today one of the subjects in which form an obstruction arise in front of the cycle of growth for some countries , such as the study of dumping is capturing a large attention by the competent because either a big  role and effect in growing the economies of nations then the subject of dumping became a field turn around its sides many measures and laws … and may be done resorting to by many states of the world to anti-dumping as approach of determent weapon delimit  the impact of dumping and gives the national agriculture sector the opportunity for rising and growing so this section of international economics is capturing a special importance and represent in same time an important

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications
...Show More Authors

In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including:  network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 08 2022
Journal Name
Chalcogenide Letters
Synthesis and characterization of Cu2S:Al thin films for solar cell applications
...Show More Authors

In this work Nano crystalline (Cu2S) thin films pure and doped 3% Al with a thickness of 400±20 nm was precipitated by thermic steaming technicality on glass substrate beneath a vacuum of ~ 2 × 10− 6 mbar at R.T to survey the influence of doping and annealing after doping at 573 K for one hour on its structural, electrical and visual properties. Structural properties of these movies are attainment using X-ray variation (XRD) which showed Cu2S phase with polycrystalline in nature and forming hexagonal temple ,with the distinguish trend along the (220) grade, varying crystallites size from (42.1-62.06) nm after doping and annealing. AFM investigations of these films show that increase average grain size from 105.05 nm to 146.54 nm

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Materials Science: Materials In Electronics
Fabrication and characterization of CoxMn0.25−xMg0.75Fe2O4 nanoparticles for H2S sensing applications
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Special Topics & Reviews In Porous Media: An International Journal
EXPERIMENTAL AND NUMERICAL INVESTIGATION OF A DOUBLE PASS SOLAR AIR HEATER PROVIDED WITH POROUS ABSORBER PLATE FOR DRYING APPLICATIONS
...Show More Authors

This investigation integrates experimental and numerical approaches to study a novel solar air heater aimed at achieving an efficient design for a solar collector suitable for drying applications under the meteorological conditions of Iraq. The importance of this investigation stems from the lack of optimal exploitation of solar energy reaching the solar collector, primarily attributable to elevated thermal losses despite numerous designs employed in such solar systems. Consequently, enhancing the thermal performance of solar collectors, particularly those employed in crop drying applications, stands as a crucial focal point for researchers within this domain. Two identical double-pass solar air heaters were designed and constructed for

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Dec 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhanced conversion of Glycerol to Glycerol carbonate on modified Bio-Char from reed plant: Enhanced conversion of Glycerol to Glycerol carbonate on modified Bio-Char from reed plant
...Show More Authors

The surplus glycerol produced from biodiesel production process as a by-product with high quantity can be considered as a good source to prepare glycerol carbonate (GC) whereas with each 1000 kg from biodiesel obtains 100 kg from glycerol. Glycerol converted to glycerol carbonate over bio-char as a catalyst prepared by slow pyrolysis process under various temperatures from 400 ᴼC to 800 ᴼC. The char prepared at 700 ᴼC considered as a best one between the others which was manufactured to activate the transesterification reaction. GC have large scale of uses such as liquid membrane in gas separation, surfactants ,detergents , blowing agent , in plastics industry, in  Pharmaceutical industry and electrolytes in lithium batteries.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Multiplicity of Accounting Concepts and it’s Impact on Thinking and Practical Applications
...Show More Authors

Accounting profession has been survived for long time and expected to survive in future, with out basing on theory in the field of practical practice . But there are numerous problems which emerge from the practical practice, their solution needs to be based on generally accepted accounting theory. The results of the researches in this field since the beginning of the last century unfolded the difficulty of formulating theory in accounting , but possible to formulate several accounting

مجلة العلوم الاقتصادية والإدارية

المجلد 18

العدد 69

الصفحات  318-  332  

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jan 12 2013
Journal Name
Pierb
RADAR SENSING FEATURING BICONICAL ANTENNA AND ENHANCED DELAY AND SUM ALGORITHM FOR EARLY-STAGE BREAST CANCER DETECTION
...Show More Authors

A biconical antenna has been developed for ultra-wideband sensing. A wide impedance bandwidth of around 115% at bandwidth 3.73-14 GHz is achieved which shows that the proposed antenna exhibits a fairly sensitive sensor for microwave medical imaging applications. The sensor and instrumentation is used together with an improved version of delay and sum image reconstruction algorithm on both fatty and glandular breast phantoms. The relatively new imaging set-up provides robust reconstruction of complex permittivity profiles especially in glandular phantoms, producing results that are well matched to the geometries and composition of the tissues. Respectively, the signal-to-clutter and the signal-to-mean ratios of the improved method are consis

... Show More