As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.
Color is one of the most important elements involved and contributing mainly to designs and visual works, whether they are fixed or mobile, for internal spaces through what color gives it the possibilities on the physical and intellectual level, if the process is linked to the functional performance or the aesthetic value, which is thus included within the system of processors and basic works in Designing the interior spaces and highlighting the functional and aesthetic aspects of them through the executed designs that are linked to certain techniques and mechanisms. Therefore, they are processed according to the references and pressure structures or the creation and modern dealing with materials and designs to implement operations in hi
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreAlthough a great deal of works has been done on the area of capital structure and dividend policy, there is still insufficient knowledge of how these policies affect stock prices. This shortcoming may have been originated from the separation between both policies when investigating their effect on stock prices. Based on this point, this research adopts a new technique (completely randomized design), to combine the effect of capital structure and dividend policy on stock prices rather than separating between them. The study used panel based regression analysis depending on the sample of 30 service and industrial Jordanian firms for the period of 2001-2010. The result of test hypotheses found the following; 1) dividend payout has a
... Show MoreOne of the most important problems of IRAQI HEALTH MINISTRY and all healthy instruments in IRAQ is Chronic Diseases because it have a negative effects on IRAQI population, this is the aim of our study ,to specify the important Chronic diseases which make the population fell weakly, they are six diseases as the IRAQ ministry of health specified ( Diabetes, blood pressure diseases ,Brain diseases , Cardiology, Asthma, epilepsy) we got these data from IRAQI HEALTH MINISTRY ,bureau of planning and studies ,for the period 2009-2012,as monthly observations , represent sum of peoples have chronic diseases in Baghdad .
Our research obj
... Show MoreAbstract:
The research concerned the study of the railway transport sector in selected countries that sought to raise the efficiency of the railway network and develop it, after realizing the importance of this vital sector, which is a link between it and the rest of the other economic sectors.
The research sought to explain the methods, methods and procedures adopted by these countries for the development of the railway sector, and to benefit from these experiments to improve the efficiency of the railway transport sector in Iraq.
The railway transport sector in Iraq suffers from the erosion of railway lines and mobile units such as locomotives, pas
... Show MoreAfter the software revolution in the last decades, the field of information technology had a tremendous evolution that made many organizations reach the best benefits from this evolution in technologies. The banking sector evolved their old system from ordinary system to the online system. The term E-banking appears to cover almost all bank operations such as money transactions, account management, instant reports, instant notifications. E-banking offers several advantages to clients, but this opens many challenges and motivates unauthorized parties to focus on creating methods and exploiting weaknesses to attack and steal critical information that belongs to the banking system or clients. Iraqi banks recently adopted E-banking se
... Show MoreThe theme of causal attribution has generated a great deal of work and focuses on the factors to which people attribute their behavior. However, its use to explain the results of the evaluation and the support for the regulation of teaching and learning acts has rarely been raised. Indeed, in the evaluation act, which is a privileged moment for reframing the learning process, teachers attribute the results obtained to the student himself, without worrying about the factors to which the student attribute itself these failures. This can distort the regulatory process and increase failure factors. The teacher's attributions of failure often relate to the results of the evaluations and are often explained by factors external to him: such as
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreSemantic segmentation realization and understanding is a stringent task not just for computer vision but also in the researches of the sciences of earth, semantic segmentation decompose compound architectures in one elements, the most mutual object in a civil outside or inside senses must classified then reinforced with information meaning of all object, it’s a method for labeling and clustering point cloud automatically. Three dimensions natural scenes classification need a point cloud dataset to representation data format as input, many challenge appeared with working of 3d data like: little number, resolution and accurate of three Dimensional dataset . Deep learning now is the po