Preferred Language
Articles
/
XBgvGJgBVTCNdQwC2rmr
Enhanced Security Taxonomy for Fog-Enabled VANETs: A Comprehensive Survey on Attacks, Challenges, Applications and Architectures
...Show More Authors

Vehicular Ad Hoc Networks (VANETs) are integral to Intelligent Transportation Systems (ITS), enabling real-time communication between vehicles and infrastructure to enhance traffic flow, road safety, and passenger experience. However, the open and dynamic nature of VANETs presents significant privacy and security challenges, including data eavesdropping, message manipulation, and unauthorized access. This study addresses these concerns by leveraging advancements in Fog Computing (FC), which offers lowlatency, distributed data processing near-end devices to enhance the resilience and security of VANET communications. The paper comprehensively analyzes the security frameworks for fog-enabled VANETs, introducing a novel taxonomy that classifies threats, attack vectors, and mitigation strategies across various applications and architectures. Additionally, this study outlines methods for secure data sharing, real-time authentication, and threat mitigation while evaluating emerging security frameworks. By highlighting the advantages of FC—such as localized data privacy management, mobility support, and real-time decision-making—this survey establishes a foundation for future research and innovation in developing secure, scalable, and robust VANET systems. The findings offer practical implications for designing next-generation ITS with enhanced security and operational efficiency.

Scopus Crossref
View Publication
Publication Date
Tue May 02 2023
Journal Name
Journal Of Optoelectronics And Advanced Materials
Preparation of samarium doped-PMMA composite by casting method to evaluate the optical properties and potential applications
...Show More Authors

Samarium ions (Sm +3), a rare-earth element, have a significant optical emission within the visible spectrum. PMMA samples, mixed with different ratios of SmCl3.6H2O, were prepared via the casting method. The composite was tested using UV-visible, photoluminescence and thermogravimetric analysis (TGA). The FTIR spectrometry of PMMA samples showed some changes, including variation in band intensity, location, and width. Mixed with samarium decreases the intensity of the CO and CH2 stretching bands and band position. A new band appeared corresponding to ionic bonds between samarium cations with negative branches in the polymer. These variations indicate complex links between the Sm +3 ion and oxygen in the ether group. The optical absorption

... Show More
Publication Date
Fri Jul 04 2025
Journal Name
Analytical Chemistry Letters
Green synthesis, characterization, and broad-spectrum anti-bacterial applications of metallic nanoparticles mediated by natural extracted materials
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 19 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Effect flexibility of the Strategic human resources in improvement operational performance: "Survey study of views of a sample of managers, engineers and technicians in the Baghdad south 2/Station directorate of Electricity"
...Show More Authors

The research attempts to diagnose the level of the effect of human resources flexibility (employees skills flexibility, employees behaviors flexibility, and human resource practice flexibility) in the south al-rusafa directorate of a power  station one of the formations and the Ministry of Electricity, and impact of a range of variables related to the performance operational, namely, (efficiency, effectiveness)recognizing the importance of the subjects studied,& because of the importance of expected results of the field under consideration,researcher selected a sample of size (121) engineers and technicians of workers in the directorate. Was my hypotheses the major search of a relationship and impact between human resources flex

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Thu Nov 12 2020
Journal Name
Journal Of Petroleum Research And Studies
Production Optimization for Natural Flow and ESP Well A Case Study on Well NS-5 Mishrif Formation-Nasriya Oil Field
...Show More Authors

As the reservoir conditions are in continuous changing during its life, well production rateand its performance will change and it needs to re-model according to the current situationsand to keep the production rate as high as possible.Well productivity is affected by changing in reservoir pressure, water cut, tubing size andwellhead pressure. For electrical submersible pump (ESP), it will also affected by numberof stages and operating frequency.In general, the production rate increases when reservoir pressure increases and/or water cutdecreases. Also the flow rate increase when tubing size increases and/or wellhead pressuredecreases. For ESP well, production rate increases when number of stages is increasedand/or pump frequency is

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 18 2017
Journal Name
Effect Of Cutting Angle And Knives Type On Some Operational Characteristics For A Locally Manufactured Palm Pruning Motorized Vibration Cutter‏ Aa Jasim, Mr Abbood, Sm Abbood‏
Effect of Cutting Angle and Knives Type on Some Operational Characteristics for a Locally Manufactured Palm Pruning Motorized Vibration Cutter‏
...Show More Authors

Publication Date
Mon Oct 22 2018
Journal Name
Journal Of Economics And Administrative Sciences
The challenges facing the Insurance sector in Iraq Analytical study in Iraqi insurance companies (National insurance company as model)
...Show More Authors

Most of World nations are striving to provide the necessary needs to protect their economic properties assets against natural or abnormal disasters that may be inflicted on such property and the means that used by such countries to reduce the damages is insurance, whereas insurance as a system that collects and distributes different risks into the group thus  to achieve a social symbiosis between individuals. The system works to transfer the risks from the individual to the group and then distributes the losses to all members of the group.

According to the importance of the insurance sector and the need to develop it as well as working on improving its performance, this search aims to identify the ac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Wed Jan 13 2021
Journal Name
Egyptian Journal Of Chemistry
Development of a nanostructured double-layer coated tablet based on polyethylene glycol/gelatin as a platform for hydrophobic molecules delivery
...Show More Authors

The aim of the current study was to develop a nanostructured double-layer for hydrophobic molecules delivery system. The developed double-layer consisted of polyethylene glycol-based polymeric (PEG) followed by gelatin sub coating of the core hydrophobic molecules containing sodium citrate. The polymeric composition ratio of PEG and the amount of the sub coating gelatin were optimized using the two-level fractional method. The nanoparticles were characterized using AFM and FT-IR techniques. The size of these nano capsules was in the range of 39-76 nm depending on drug loading concentration. The drug was effectively loaded into PEG-Gelatin nanoparticles (≈47%). The hydrophobic molecules-release characteristics in terms of controlled-releas

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Crossref