In recent years, the rapid development in the field of wireless technologies led to the appearance of a new topic, known as the Internet of things (IoT). The IoT applications can be found in various fields of our life, such as smart home, health care, smart building, and etc. In all these applications, the data collected from the real world are transmitted through the Internet; therefore, these data have become a target of many attacks and hackers. Hence, a secure communication must be provided to protect the transmitted data from unauthorized access. This paper focuses on designing a secure IoT system to protect the sensing data. In this system, the security is provided by the use of Lightweight AES encryption algorithm to encrypt the data received from physical environment. The hardware used in this proposal is the Raspberry Pi 3 model B and two types of sensors. The LAES algorithm was embedded inside the Raspberry in order to protect the sensing data, that come from sensors connected to the Raspberry Pi, before sending them through the network. The analysis results show that the proposed IoT security system consumes less time in encryption/decryption and has high throughput when compared with others from related work. Its throughput is higher in about 19.24% than the value reported for one system in the related studies.
<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreInternet of Vehicle (IoV) is one of the most basic branches of the Internet of Things (IoT), which provides many advantages for drivers and passengers to ensure safety and traffic efficiency. Most IoV applications are delay-sensitive and require resources for data storage and computation that cannot be afforded by vehicles. Thus, such tasks are always offloaded to more powerful nodes, like cloud or fog. Vehicular Fog Computing (VFC), which extends cloud computing and brings resources closer to the edge of the network, has the potential to reduce both traffic congestion and load on the cloud. Resources management and allocation process is very critical for satisfying both user and provider needs. However, th
... Show MoreThis article aims to explore the importance of estimating the a semiparametric regression function ,where we suggest a new estimator beside the other combined estimators and then we make a comparison among them by using simulation technique . Through the simulation results we find that the suggest estimator is the best with the first and second models ,wherealse for the third model we find Burman and Chaudhuri (B&C) is best.
As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreEpithelial mesenchymal transition (EMT) is a process comprising cellular and molecular events which result in cells shifting from an epithelial to a mesenchymal phenotype. Periodontitis is a destructive chronic disease of the periodontium initiated in response to a dysbiotic microbiome, and dominated by Gram-negative bacteria in the subgingival niches accompanied by an aberrant immune response in susceptible subjects. Both EMT and periodontitis share common risk factors and drivers, including Gram-negative bacteria, excess inflammatory cytokine production, smoking, oxidative stress and diabetes mellitus. In addition, periodontitis is characterized by down-regulation of key epithelial markers such as E-cadherin together with up-regulation of
... Show MoreUltraviolet photodetectors have been widely utilized in several applications, such as advanced communication, ozone sensing, air purification, flame detection, etc. Gallium nitride and its compound semiconductors have been promising candidates in photodetection applications. Unlike polar gallium nitride-based optoelectronics, non-polar gallium nitride-based optoelectronics have gained huge attention due to the piezoelectric and spontaneous polarization effect–induced quantum confined-stark effect being eliminated. In turn, non-polar gallium nitride-based photodetectors portray higher efficiency and faster response compared to the polar growth direction. To date, however, a systematic literature review of non-polar gallium nitride-
... Show MoreToday, there are large amounts of geospatial data available on the web such as Google Map (GM), OpenStreetMap (OSM), Flickr service, Wikimapia and others. All of these services called open source geospatial data. Geospatial data from different sources often has variable accuracy due to different data collection methods; therefore data accuracy may not meet the user requirement in varying organization. This paper aims to develop a tool to assess the quality of GM data by comparing it with formal data such as spatial data from Mayoralty of Baghdad (MB). This tool developed by Visual Basic language, and validated on two different study areas in Baghdad / Iraq (Al-Karada and Al- Kadhumiyah). The positional accuracy was asses
... Show More