Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB84 protocol with the AES algorithm in
WSN security. The results of analysis indicated a high level of security between the data by depending on the
generation of secure keys, and reached an accuracy rate of about (80-95) % based on using NIST statistical.
The efficiency of the work increased to 0.704 after using the Quantum Bit Error Rate equation, eventually
increasing the network performance. This results in the reduction of the overall amount of energy, and the time
required for performing the key exchange in the encryption and decryption processes decreased.
In this work, a novel system is designed to remote monitor / automatic control of the temperature, humidity and soil moisture of the agricultural greenhouses. In the proposed system, the author used the mentioned sensors for monitoring the climatic conditions of the agricultural greenhouses; and the system makes a controlling process to fix the required parameters for plant growth by running / stopping the fan, air exchanger and irrigation devices when any changes happened in these parameters. The presented system is based on XBee protocol in the implemented wireless sensor star topology network (WSN) to monitor the agricultural greenhouses in real time, and used the GSM and Internet technologies to monitor the agricultu
... Show MoreThe current research aims to identify pictorial coding and its relationship to the aesthetic taste of art education students. The research community consisted of (10) plastic artworks, and (3) artworks were selected as a sample for analysis and decoding. With the aim of the research, the research tool was prepared as it consisted of an analysis form, and the researcher used statistical methods: Equation (Cooper) to find the percentage of agreement between the arbitrators and the equation (Scott) to calculate the validity of the tool, and the correlation coefficient (Pearson) to extract stability in the method of segmentation half. Shape formations and achieve encryption of the plastic image through decoding symbols, meanings, and the sig
... Show MoreDifferent methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi
... Show MoreThe research discusses one of the most critical issues of corporate finance which is related to asset utilization efficiency. Researchers used internal growth rate as independent variable (Proxy of asset utilization efficiency) and sustainable growth rate-dependent variable (proxy of stockholders wealth). According to these two variables, researchers formulate major hypotheses (There is no significant effect of internal growth rate on sustainable growth rate), as well as two sub-hypotheses, examine the components of major variables. Sample of Iraqi industrial companies which listed in the Iraqi stock exchange selected to test and examine main hypotheses. Result of simple and multiple regressions explain there is a significant effect of i
... Show MoreAction films employ many artistic and literary elements that contribute greatly to building the general meaning of the film and push the wheel of the film forward. The element of mystery and suspense is used as two basic elements in action films. The cinematic language in action films depends on global coding, which is not models as it might be. It is based on logic, rather as units that aspire to morphology and not their homogeneity as the physical sense, but as the logical harmony of interpretive authority and enlightenment and in action films as a field of communication and a field in its origin in which the signifier contrasts with the perceptions of the meaning and in it takes a certain number of units preventing each other and thro
... Show MoreBig data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However
... Show MoreObjective(s): The study aims at examining the role of technical information used in nursing education, such as "the
Internet, e-mail services, video, audio conferencing and other "in the College of Nursing at the University of Baghdad.
Methodology: A descriptive and analytical study which was using the examination approach was conducted on a
non-probability sample (purposive sample) of (42) members of the faculty of the College of Nursing at the University
of Baghdad. A questionnaire was constructed for the purpose of the study. It was consisted of two parts; the first part
which included the demographic characteristics of faculty members (such as age, sex,
qualification, scientific title, and the scientific department
Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the se
... Show MoreCorruption is a phenomenon that exists in all times and places, they appear in the developing countries and in developed countries, and in all political systems. And its repercussions and economic repercussions on the society in which it is rampant, and lead to the undermining of economic development and obstruction, is also working on increasing poverty and unemployment, as well as its role in the worsening of social problems, and political instability. And corruption is deviant behavior is illegal and contrary to the teachings of the religious and moral values. The emergence of this phenomenon is due to several reasons, including political, economic, social and cultura
... Show More