Preferred Language
Articles
/
ijs-5314
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. In each experiment, two chains are combined by using a hash function (SHA-2) to produce secret keys. The Network Simulator Version 2 (NS2) was used to assess the network throughput for the generated key. The randomness of the suggested LWM method has been tested by using the Diehard statistical test and the Entropy test. The results of the tests show that the encryption secret keys have a high level of data randomness.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Facial Expression Recognition Based on Deep Learning: An Overview
...Show More Authors

      Recognizing facial expressions and emotions is a basic skill that is learned at an early age and it is important for human social interaction. Facial expressions are one of the most powerful natural and immediate means that humans use to express their feelings and intentions. Therefore, automatic emotion recognition based on facial expressions become an interesting area in research, which had been introduced and applied in many areas such as security, safety health, and human machine interface (HMI). Facial expression recognition transition from controlled environmental conditions and their improvement and succession of recent deep learning approaches from different areas made facial expression representation mostly based on u

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Properties of a Complete Fuzzy Normed Algebra
...Show More Authors

          The aim of this paper is to translate the basic properties of the classical complete normed algebra to the complete fuzzy normed algebra at this end a proof of multiplication fuzzy continuous is given. Also a proof of every fuzzy normed algebra  without identity can be embedded into fuzzy normed algebra  with identity  and  is an ideal in  is given. Moreover the proof of the resolvent set of a non zero element in complete fuzzy normed space is equal to the set of complex numbers is given. Finally basic properties of the resolvent space of a complete fuzzy normed algebra is given.

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
مجلة بحوث الشرق الأوسط
دراسة مقارنة لمستوى التمکین الإداری بین مشرفی التربیة الریاضیة (الاختصاص والفنی) لمدیریات التربیة فی محافظة بغداد A Comparative Study of the Level of Administrative Empowerment between the Physical Education Supervisors (Specialization and Technical) of Education Directorate in Baghdad Governorate
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sat Feb 22 2025
Journal Name
Al–bahith Al–a'alami
Frameworks for international press coverage of external interference in the formation of the Iraqi government Analytical study for the Saudi Al-Sharq Al-Awsat and Kayhan Al-Arabi-Iranian newspapers for the period (1/1/2018 - 31/12/2018)
...Show More Authors

This research deals with the frameworks and mechanisms of international press coverage of the issue of foreign interference in the formation of the Iraqi government in the Saudi newspapers Asharq Al-Awsat and Kayhan Al-Arabi Iran and how this topic was addressed in the two newspapers. The frameworks for international press coverage of external interference in the formation of the Iraqi government. ”This research is one of the descriptive research that adopted the survey method، which made it possible to use the content analysis tool to analyze
the content of the two newspapers، whose numbers are (624) from the
newspapers (Al-Sharq Al-Awsat Al-Saudi Arabia and Kayhan Al-Arabi Iran) from (1/1/2018 to 31/12/2018)، and the researc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 26 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of banking effort tests in the face of monetary credit risk and its impact on the profits and adequacy of the bank’s capital : / a case study of Sumer Commercial Bank for the period from 2015 to 2020
...Show More Authors

The research seeks to identify the proposed scenarios to predict and ward off monetary credit risks that the bank is exposed to in the future, using the banking stress tests model, and showing their impact on capital adequacy and profitability ratio,To achieve this purpose, Sumer Commercial Bank was taken as a case study, and mathematical equations were used to extract the results. Low percentage of profits and returns, strictness in the process of granting credit and financing operations in order to reduce credit risks.

View Publication Preview PDF
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
Images of ruin in "Throne" and " Water stream" by Maysaloon Hadi and "War" by Glezio: A Compartive Study: Les images du débris dans "Le trône et le ruisseau " de Maysaloon Hadi et "La guerre" de Le Glézio (étude comparative)
...Show More Authors

Our research comes to shed light on Iraqi literature as literature that arose in special circumstances alongside foreign literature. Using comparative research methods, we chose to highlight two distinguished writers, who have their mark in the world of literature. The first is the Iraqi writer Maysaloun Hadi, who is considered an icon of Iraqi feminist literature, and the second is the French writer Le Clézieu, who won the Nobel in 2008. We will see through the research how the two authors expressed their views of modernity and urbanism. And how each of them separately portrayed the psychological and moral projections that formed the essence of man today. 

Résumé

Notre recherche abord un des points inc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Research Journal Of Pharmacy And Technology
<i>Insilico</i> and <i>in vitro</i> Approach for Design, Synthesis, and Anti-proliferative Activity of Novel Derivatives of 5-(4-Aminophenyl)-4-Substituted Phenyl-2, 4-Dihydro-3<i>H</i>-1, 2, 4-Triazole-3-Thione
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sat Feb 22 2025
Journal Name
Al-fatih Journal
Development of explosive power training with weights in a way the ups and downs and its impact on the improvement of some variables Albyukinmetekih and technical performance of the skill of a leap forward on your hands vaulting modern
...Show More Authors

View Publication
Publication Date
Sat Feb 22 2025
Journal Name
Sciences Journal Of Physical Education
Leadership patterns for university student activities managers according to the Blake and Moton model (The managerial Grid)
...Show More Authors

The researcher is one of the workers in university sports student activities, as he noticed that there is a diversity in the use of leadership patterns among managers of student activities in Iraqi universities between one director and another, which leads to the impact of these leadership styles on performance, positive or negative, in the level of human relations and the achievement of results. The researcher adopted the descriptive method in the survey method with relational relationships. The research sample consisted of (184) sports coaches who represent (27) universities and governmental and private colleges. To achieve the research objectives, the researcher used the Statistical Package for Social Sciences (Spss). To extract.statisti

... Show More
View Publication
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref