Vehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that classifies threats, attack vectors, and mitigation strategies across various applications and architectures. Additionally, this study outlines methods for secure data sharing, real-time authentication, and threat mitigation while evaluating emerging security frameworks. By highlighting the advantages of FC—such as localized data privacy management, mobility support, and real-time decision-making—this survey establishes a foundation for future research and innovation in developing secure, scalable, and robust VANET systems. The findings offer practical implications for designing next-generation ITS with enhanced security and operational efficiency.
This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss
... Show MoreBackground: Prosthodontic services have changed markedly due to an introduction of new materials, techniques and treatment options. The aim of this study were to identify the type of materials and the methods used by dental practitioners in their clinics to construct conventional complete dentures and to specify the type and design for removable partial dentures (RPDs); and to then compare them with those taught in dental schools. Materials and methods: A total of 153 dental practitioners in Sulaimani city completed a written questionnaire. The questionnaire included 19 questions regarding complete and RPDs fabrication. Results: Most of the practitioners provide complete dentures (81.6%) and RPDs (95.3%) in their clinics. Polyvinyl silox
... Show MoreThe security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.
Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreOver the past few decades, the surveying fieldworks were usually carried out based on classical positioning methods for establishing horizontal and vertical geodetic networks. However, these conventional positioning techniques have many drawbacks such as time-consuming, too costly, and require massive effort. Thus, the Global Navigation Satellite System (GNSS) has been invented to fulfill the quickness, increase the accuracy, and overcome all the difficulties inherent in almost every surveying fieldwork. This research assesses the accuracy of local geodetic networks using different Global Navigation Satellite System (GNSS) techniques, such as Static, Precise Point Positioning, Post Processing Kinematic, Session method, a
... Show MoreHalf of the oil production of the worldwide is a result of the water flooding project. But the main concern of this process is mobility control of the injected fluid, because the unfavorable mobility ratio leads to fingering effect. Adding polymer to the injection water increase the water viscosity, therefore, the displacement will be more stable and have a greater sweep efficiency.
Using of polymer flooding has received more attention these days. Polymer has great potential in the Middle East region, especially in reservoir with high temperature and salinity.
The main objective of this work is to show the effect of shear rate, salinity, temperature, polymer concentration on polymer v
... Show MoreThe convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog
... Show MoreIn this research, we have added nano anatase TiO2 as a partial replacement of Portland cement by a weight percentage of (0.25 to 1%) for the development of properties for protection against bacteria. The control mix was made by using "the cement to sand" proportion about (1: 2.75) with the "water to cement" proportion of (0.5) to study the structure, porosity, water absorption, density, mechanical properties, as well as anti-bacterial behavior. Inspections have been done such as scanning electron microscopy (SEM), and atomic force microscope (AFM) for mortar. Experimental results showed that after the addition of Nano powders in cement mortar, the structural properties improved significantly with the development of hydration o
... Show MorePolypyrrole (PPy) nanocomposites were prepared using chemical oxidation and were combined with manganese oxide (MnO2) nanoparticles. The PPY-MnO2 nanocomposite was synthesized by integrating PPy nanofibers with varying volume ratio percentages of MnO2 dopant (10, 30, and 50% vol. ratio). The structural features of the PPy and PPy-MnO2 nanocomposite were investigated using X-ray diffraction (XRD). Fourier transfor infrared (FTIR) spectroscopy was used to demonstrate the molecular structures of primary materials and the final product of PPy, MnO2, and PPy- MnO2 nanocomposites. Field Emission Scanning Electron Microscopy (FESEM) showed that the morphology of PPy consisted of a network of nanofibers. Increasing the volume ratios of ma
... Show More