Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in
WSN security. The results of analysis indicated a high level of security between the data by depending on the
generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical.
The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually
increasing the network performance. This results in the reduction of the overall amount of energy, and the time
required for performing the key exchange in the encryption and decryption processes decreased.
The concealment of data has emerged as an area of deep and wide interest in research that endeavours to conceal data in a covert and stealth manner, to avoid detection through the embedment of the secret data into cover images that appear inconspicuous. These cover images may be in the format of images or videos used for concealment of the messages, yet still retaining the quality visually. Over the past ten years, there have been numerous researches on varying steganographic methods related to images, that emphasised on payload and the quality of the image. Nevertheless, a compromise exists between the two indicators and to mediate a more favourable reconciliation for this duo is a daunting and problematic task. Additionally, the current
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreAssessing performance efficiency is critical to the management need for oversight, planning, and continuous periodic evaluation of the multiple activities of Northern Cement State Company in order to determine the level of achievement of the objectives set, and to correct the deviations and delays that the evaluation shows and limitation of liability. What cannot be measured cannot be managed. The aim of this research is to highlight the impact of using BSC, financial and non-financial, to give comprehensive and clear picture of the company's performance and to measure the quality of its performance by using six-sigma and the level of deviations in achieving the planned goals. Therefore, four-key hypotheses were formulated for th
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreThe current research aims to diagnose the role of social responsibility as a contributing factor in enhancing the quality of services provided by the public sector in Iraq, where the research sought to demonstrate the relationship and impact of social responsibility dimensions (economic, legal, moral, and human) on the sector Services related to the electric field in Nineveh governorate because of its importance and its direct relationship with the citizen especially after the end of military operations in the destruction of the electricity sector by a large percentage in the city of Mosul. Nineveh Electricity Distribution Directorate / Center was chosen as a research community including (administrators and staff) of the research
... Show MoreThe fluorescence and absorption spectra of Fluoranthene dissolved in
cyclohexane and ethanol were studied and analyzed. The effect of the
concentration of this molecule and the polarity of the solvents on the spectral
shifts and on relative intensity has been investigated. A computational program
was written in order to convert the spectra from grapher to data. Some
photophysical parameters such as oscillator strength and quantum efficiency have
been calculated. Fluorescence quantum efficiency of Fluoranthene was measured
relative to Quinine Sulfate (QS) in 1N H2SO4. The obtained values were (0.5) in
cyclohexane and (0.45) in ethanol
Reciprocal Teaching is an interactive method that is used to improve reading comprehension. Using this teaching strategy, teachers and students take turns leading discussions regarding sections of text using the four strategies: predicting, questioning, clarifying and summarizing. This study is an attempt to investigate the effect of using reciprocal teaching on improving female college students' achievement in reading comprehension. To fulfill the aim of the study, the researcher has adopted two null hypotheses: first, there is no significant difference between the achievement of students' who practice the reciprocal teaching technique and that of students who do not practice it. Second, there is no statistically significant difference
... Show MoreThe effect of three ionic liquids viz., 1-hexyl-3-methylimidazolium tetrafluoroborate (ILE), 1-hexyl-3-metylimidazolium hexafluorophosphate (ILF) and 1-octyl-3-methylimidazolium tetrafluoroborate (ILG) when used as surfactants on the performance of dissolved air floatation (DAF) was investigated.
Experiments were conducted at a temperature of 30-35 ºC, 10ppm ferric chloride as coagulant, 50% recycle ratio, pH 8, and 10 minutes treatment time to find oil and grease (OG) and turbidity removal efficiencies at saturation pressure (2-6) bar.
ILs were used at concentration of 50 µl/liter of treated water in two positions in DAF system; the saturation vessel and the treatment tank. The performance using ILs
... Show MoreThe present research has investigated the effect of microwave energy on improving the flow properties of heavy crude oil. The fragmentation of crude oil molecules was carried out with and without using 1 and 10 wt. % concentration of various types of H-donors like tetralin, cyclohexane, and naphtha. Microwave power of 320, 385, and 540 W and radiation time 1-9 min, and temperature were studied. The kinematic viscosity and asphaltene content were measured for evaluation the improving of heavy crude oil.
Results show that viscosity of crude oil decreased with increase H-donor concentration, a maximum percentage of viscosity reduction was10.63 % for tetralin at 6 min radiation time, while 8.67%, and 7.34% for cycl
... Show MoreThis study aims mainly to identify the role of the use of blockchain technology in improving the quality of digital financial reports, answering questions and testing the hypothesis of the study, the researchers relied on the descriptive analytical approach, and to obtain the necessary data a questionnaire was distributed after evaluation to the study community.
The results of the study have shown that the use of blockchain technology helps to provide a high degree of reliability in digital financial reports published to banks over the Internet, ensure the speed of completion and completion, and maintain the privacy and confidentiality of the information contained in the digital financial reports of banks
... Show More