Preferred Language
Articles
/
ijs-3180
A lightweight AES Algorithm Implementation for Secure IoT Environment
...Show More Authors

In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the data received from physical environment. The hardware used in this proposal is the Raspberry Pi 3 model B and two types of sensors. The LAES algorithm was embedded inside the Raspberry in order to protect the sensing data, that come from sensors connected to the Raspberry Pi, before sending them through the network. The analysis results show that the proposed IoT security system consumes less time in encryption/decryption and has high throughput when compared with others from related work. Its throughput is higher in about 19.24% than the value reported for one system in the related studies.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis
...Show More Authors

The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.

This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Security of Wireless Sensor Nodes
...Show More Authors

Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Quality of Audit Work Under Expert System
...Show More Authors

The research aims to extrapolate the repercussions of the use of expert systems in the work of the external auditor on the quality of audit, as the research problem was that despite the use of these techniques in audit work, there is a problem related to the efficiency and effectiveness of these technological systems used in audit work, the feasibility of their use and the extent of their impact: The quality of the audit process.

The researchers adopted the questionnaire as a tool for collecting study data from a community composed of auditors in auditing offices and companies in Iraq, and the auditors of the Iraqi Federal Financial Supervision Bureau. The number of recovered and valid qu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
Symbolic significance and its effectiveness in industrial product design
...Show More Authors

The current research dealt with the symbolic significance and its effectiveness in the design of the industrial product, the aesthetic communicative discourse that embodies the imagination and human conscience. Whether according to what has been termed custom or what has been approved by traditions long ago, symbolism may be the main actor in linking the identifying components of the product. In addition, symbolism provides the user with the key to accessing a direct awareness of the product’s shape and function, as an identification of the product by stimulating the symbolic form of the consumer’s imagination and inviting him to To meditate in order to realize the implicit meaning behind these forms and thus achieve the symbolism of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Geomorphology of Karstic Caves in Surdash _Sulamini
...Show More Authors

The Caves within Surdash that are located in the northwest of Sulaymaniyah governorate in Iraq within the area (672) km district have been studied as they characterized by natural variable criteria reflected in turn on caves formation.  One of the remarkable criteria is the characteristic of geological formations which include(12) Geological Formation, (6)of them Karst with high permeability. The field study showed that a high number of Caves in these karst formations in addition to the prevalence of geological formations with (75) linear structures extending NE-SW directions as well as the availability of water resources. Studies approved that caves vary in their sizes according to inverse relationship between caves areas and how c

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Error Analysis in Numerical Algorithms
...Show More Authors

   In this paper, we applied the concept of the error analysis using the linearization method and new condition numbers constituting optimal bounds in appraisals of the possible errors. Evaluations of finite continued fractions, computations of determinates of tridiagonal systems, of determinates of second order and a "fast" complex multiplication. As in Horner's scheme, present rounding error analysis of product and summation algorithms. The error estimates are tested by numerical examples. The executed program for calculation is "MATLAB 7" from the website "Mathworks.com

View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
Modern sound systems and their work in contemporary feature film
...Show More Authors

Perhaps going to watch movies in cinemas today has become different from what it was before. The cinematic film, the clarity of the image and the luster of its colors pulled the rug out from under the most important change that occurred in the structure of the contemporary cinematography, which is the sound. The surround sound environment that immerses viewers in the realism of sound that reaches them from all directions, and for this the researcher found it necessary to shed light on this topic because of its importance, so the research problem was represented in the following question: (How are modern sound systems used in the structure of contemporary feature films?) The theoretical framework included two topics: the first: the dialec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Simulation and Evaluation of Soliton Signal Effects In Fiber Optics
...Show More Authors

A soliton is a solitary wave whose amplitude, shape, and velocity are conserved after a collision with another soliton. Solitons, in general, manifest themselves in a large variety of wave/particle systems in nature: practically in any system that possesses both dispersion (in time or space) and nonlinearity. Solitons have been identified in optics, plasmas, fluids, condensed matter, particle physics, and astrophysics. Yet over the past decade, the forefront of soliton research has shifted to neuroscience. The Soliton model in optical fiber is a recently developed model that attempts to explain how signals are propagated within optical fiber without dispersion. In this research, it proposes that the signals travel along the Single Mode O

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 12 2023
Journal Name
Kurdish Studies
The Role of Human Values in the Islamic Educational System
...Show More Authors

This research is an initial attempt to explore the reality of education and its concept in Islam, and to describe the presence of educational practices in the Arab-Islamic heritage. The importance of this research lies in addressing a set of important issues related to the contemporary Islamic educational system. The research revealed the extent of the need for authentic educational values that draw their reference from the origins of Islam, and it emphasized the analysis of the reality of education in the Islamic world and the identification of its problems and the finding of solutions through a quick and comprehensive look at the diverse contributions of Muslimthinkers to Islamic educational thought, and their active ro

... Show More
Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Fast 128-bit Multi-Pass Stream Ciphering Method
...Show More Authors

      Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref