Preferred Language
Articles
/
bsj-2631
A Proposed Agent System for Network Monitoring
...Show More Authors

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presented in real time which is minimizing the cost that represents the important factor to successful management of networks that was achieved using agents.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
Drag-Reducing Agent for Aqueous Liquid Flowing in Turbulent Mode through Pipelines
...Show More Authors

Abstract

In this study, mucilage was extracted from Malabar spinach and tested for drag-reducing properties in aqueous liquids flowing through pipelines.  Friction produced by liquids flowing in turbulent mode through pipelines increase power consumption. Drag-reducing agents (DRA) such as polymers, suspended solids and surfactants are used to reduce power losses. There is a demand for natural, biodegradable DRA and mucilage is emerging as an attractive alternative to conventional DRAs. Literature review revealed that very little research has been done on the drag-reducing properties of this mucilage and there is an opportunity to explore the potential applications of mucilage from Malabar spinach. An experi

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Measurement: Sensors
Dynamic monitoring of saturated stiff clay soil foundation structure by falling weight deflectometer system under impact loads sensors effect
...Show More Authors

Experiments research is done to determine how saturated stiff clayey soil responds to a single impulsive load. Models made of saturated, stiff clay were investigated. To supply the single pulse energy, various falling weights from various heights were tested using the falling weight deflectometer (FWD). Dynamic effects can range from the major failure of a sensitive sensor or system to the apparent destruction of structures. This study examines the response of saturated stiff clay soil to a single impulsive load (vertical displacement at the soil surface below and beside the bearing plates). Such reactions consist of displacements, velocities, and accelerations caused by the impact occurring at the surface depth induced by the impact loads

... Show More
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Proposed emerged and enhanced routing protocols for wireless networks
...Show More Authors

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 26 2023
Journal Name
Journal Of Contemporary Medical Sciences
Glyceryl Trinitrate, a Vasodilating Drug Acts as an Antibiofilm Agent in Serratia marcescens
...Show More Authors

Objectives: Serratia marcescens is a gram-negative pathogen of many species. The ability of S. marcescens to form biofilms and its potent innate resistance to antimicrobials and cleaning solutions are both essential for its pathogenicity and survival. The present study was conducted to investigate the effect of glyceryl trinitrate (GTN) on the biofilm of S. marcescens, as an alternative for antibiotic therapy. Methods: Different specimens, including ear swabs, burns, mid-stream urine, wound swabs, and sputum, were collected from patients who were brought to Al-Ramadi Hospital, Iraq. All samples were cultured, and the colonies that were obtained were detected using the VITEK® 2 compact. The ability of biofilms to develop was e

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
Design of a PID-Lead Compensator for a Twin Rotor Aerodynamic System (TRAS)
...Show More Authors

This paper deals with a Twin Rotor Aerodynamic System (TRAS). It is a Multi-Input Multi-Output (MIMO) system with high crosscoupling between its two channels. It proposes a hybrid design procedure that combines frequency response and root locus approaches. The proposed controller is designated as PID-Lead Compensator (PIDLC); the PID controller was designed in previous work using frequency response design specifications, while the lead compensator is proposed in this paper and is designed using the root locus method. A general explicit formula for angle computations in any of the four quadrants is also given. The lead compensator is designed by shifting the dominant closed-loop poles slightly to the left in the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref