Preferred Language
Articles
/
ijs-5314
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. In each experiment, two chains are combined by using a hash function (SHA-2) to produce secret keys. The Network Simulator Version 2 (NS2) was used to assess the network throughput for the generated key. The randomness of the suggested LWM method has been tested by using the Diehard statistical test and the Entropy test. The results of the tests show that the encryption secret keys have a high level of data randomness.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Rotation and Magnetic Force Effects on Peristaltic Transport of Non -Newtonian Fluid in a Symmetric Channel

In this paper, the impact of magnetic force, rotation, and nonlinear heat radiation on the peristaltic flow of a hybrid bio -nanofluids through a symmetric channel are investigated. Under the assumption of a low Reynolds number and a long wavelength, the exact solution of the expression for stream function, velocity, heat transfer coefficient, induced magnetic field, magnetic force, and temperature are obtained by using the Adomian decomposition method. The findings show that the magnetic force contours improve when the magnitude of the Hartmann number M is high and decreases when rotation increases. Lastly, the effects of essential parameters that appear in the problem are analyzed through a graph. Plotting all figures is done using the

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Scopus (202)
Crossref (203)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Sep 06 2022
Journal Name
Methods And Objects Of Chemical Analysis
Spectrophotometric Analysis of Quaternary Drug Mixtures using Artificial Neural network model

A Novel artificial neural network (ANN) model was constructed for calibration of a multivariate model for simultaneously quantitative analysis of the quaternary mixture composed of carbamazepine, carvedilol, diazepam, and furosemide. An eighty-four mixing formula where prepared and analyzed spectrophotometrically. Each analyte was formulated in six samples at different concentrations thus twenty four samples for the four analytes were tested. A neural network of 10 hidden neurons was capable to fit data 100%. The suggested model can be applied for the quantitative chemical analysis for the proposed quaternary mixture.

Scopus
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Classification of brain tumors using the multilayer perceptron artificial neural network

Information from 54 Magnetic Resonance Imaging (MRI) brain tumor images (27 benign and 27 malignant) were collected and subjected to multilayer perceptron artificial neural network available on the well know software of IBM SPSS 17 (Statistical Package for the Social Sciences). After many attempts, automatic architecture was decided to be adopted in this research work. Thirteen shape and statistical characteristics of images were considered. The neural network revealed an 89.1 % of correct classification for the training sample and 100 % of correct classification for the test sample. The normalized importance of the considered characteristics showed that kurtosis accounted for 100 % which means that this variable has a substantial effect

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education
Evaluating the performance of project management using network diagrams methods: A case study in the Ramadi Municipality

This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the applica

... Show More
Scopus (1)
Scopus
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Secret Reasons for the Western Scholars Studies The Biography of the prophet

Western Scholars have criticized al the material on the point of reliability . Some have taken the unduly Sceptical view that nothing is to be trusted except Quran . The present study is based on opposing view that at least the material in the early biographers is to be accepted as true , except where there are particular reasons for thinking that an anecdote has been distorted ( or invented ) through legal or political motives. It is also assumed that most of the background material culled from a large number of vaired works , is sound . This standpoint .I would claim , leads to a coherent view of Muhammad's life and achievement.

View Publication Preview PDF
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Data integrity enhancement for the encryption of color images based on CRC64 technique using multiple look-up tables

Communication is one of the vast and rapidly growing fields of engineering, where
increasing the efficiency of communication by overcoming the external
electromagnetic sources and noise is considered a challenging task. To achieve
confidentiality for color image transmission over the noisy communication channels
a proposed algorithm is presented for image encryption using AES algorithm. This
algorithm combined with error detections using Cyclic Redundancy Check (CRC) to
preserve the integrity of the encrypted data. This paper presents an error detection
method uses Cyclic Redundancy Check (CRC), the CRC value can be generated by
two methods: Serial and Parallel CRC Implementation. The proposed algorithm for
the

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
International Journal Of Science And Research (ij
Mathematical Models for Predicting of Organic and Inorganic Pollutants in Diyala River Using AnalysisNeural Network

Diyala river is the most important tributaries in Iraq, this river suffering from pollution, therefore, this research aimed to predict organic pollutants that represented by biological oxygen demand BOD, and inorganic pollutants that represented by total dissolved solids TDS for Diyala river in Iraq, the data used in this research were collected for the period from 2011-2016 for the last station in the river known as D17, before the river meeting Tigris river in Baghdad city. Analysis Neural Network ANN was used in order to find the mathematical models, the parameters used to predict BOD were seven parameters EC, Alk, Cl, K, TH, NO3, DO, after removing the less importance parameters. While the parameters that used to predict TDS were fourte

... Show More