Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino esp8266 Node MCU board and a GPS module are used. The cryptography uses the chaos-based symmetric-key encryption technique for data. This scheme utilizes a chaotic map (Hénon map) for robustness and security of data. The key sensitivity can be performed by statistical experiments to determine the safety, reliability, and speed of the algorithm. The proposed algorithm presents several exciting features, such as a high level of security, sufficient saving of the energy of the sensor network, and an acceptable encryption speed compared to Advanced Encryption Standard (AES) and Data Encryption Standard (DES).
Establishing complete and reliable coverage for a long time-span is a crucial issue in densely surveillance wireless sensor networks (WSNs). Many scheduling algorithms have been proposed to model the problem as a maximum disjoint set covers (DSC) problem. The goal of DSC based algorithms is to schedule sensors into several disjoint subsets. One subset is assigned to be active, whereas, all remaining subsets are set to sleep. An extension to the maximum disjoint set covers problem has also been addressed in literature to allow for more advance sensors to adjust their sensing range. The problem, then, is extended to finding maximum number of overlapped set covers. Unlike all related works which concern with the disc sensing model, the cont
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreBackground: Axillary lymph node (ALN) enlargement with diffuse cortical thickening and conserved echogenic hilum may represent a diagnostic and therapeutic challenge. Sonographic strain elastography may help the characterization of borderline ALN.
Aim: To evaluate the strain elastography of borderline ALN and to calculate a cutoff value of strain ratio (SR) that can identify suspicious ALN with the highest sensitivity and specificity to reduce unnecessary invasive procedures.
Subjects and Methods: A prospective study included 45 patients who attended the Breast clinic in Oncology Teaching Hospital with borderline axillary lymphadenopathy (intact hilum and diffusely thic
... Show MoreBackground: Sonographic examination is an important tool in assessment of normal and abnormal cervical lymph nodes. The aim of the study is to assess the distribution and the characteristic features of normal cervical lymph nodes in a sample of Syrian population. Materials and Methods: Fifty healthy Syrian subjects (25 men and 25 women) with an age of 20 -60years old, who had their cervical lymph nodes examined by ultrasound. Three hundred and two lymph nodes were detected. Lymph nodes were evaluated for their number, size, site, echogenic hilus, shape, as well as for the border sharpness. The subjects were categorized by age into four groups, (20 -30, 31 - 40 , 41 - 50 , 51- 60 years ). Statistical analysis of data was done using SP
... Show More<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but
... Show MoreWireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica
... Show MoreSecurity reflects a permanent and complex movement that complies with international and societal needs and developments in all its dimensions, interactions and levels. To constitute a universal demand for all States, communities and individuals. The question of security is one of the most important motivations and motivations that govern the behavior, and even the objectives of those societies and States. These groups or individuals have always sought to avoid fear and harm, and to provide stability, safety and security. In the light of this, security studies have been among the important fields of study in the field of international and strategic relations. The field witnessed many theoretical efforts, from the traditional perspective,
... Show MoreEnvironmental controls, especially for temperature and humidity, are essential to maintain the safety, purity and effectiveness of drugs. The measurement of humidity can be particularly difficult and important in climatic and thermostatic chambers (warehouses, ovens, cold rooms, fridges, drying rooms, insulated boxes, etc.).
The old method of monitoring and qualification of climatic and thermostatic chambers requires placing a defined number of recorders, then programming and store them. After that, to examine the values recorded to revolve the status of the climatic and thermostatic chambers, if they are compliant or not-complaint at any time, so all that goes to waste time and efficiency of values.
We can do the monitoring and qu
The state, as one of the most important social institutions that works to provide services and security for individuals, needs security, and this security is achieved according to a specific hierarchy that starts from the security of the individual and the security of society to the security of the state, as the advanced state security is based on the basic pillars of solidarity and social peace This security consists of several levels (human, regional, social, economic, and cyber), unlike Arab criminal legislation, including Iraqi law, which is based on the concept of traditional state security, as it relies on the military side only in order to provide maximum criminal protection for the security of the political system The security of
... Show MoreArab Food's Security