As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.
This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand
This study involved the effect of anew nickel (II) complexs with formla [NiL2(H2O)2].2.5ETOH where L=Bis[5-(p-nitrophenyL)-4-phenyL-1,2,4-traizole-3-dithocarbamato hydrazide] diaqua. nickel(II). Ethanol(2.5).and anti-cancer drug cyclophosphamide on specific actifity of two Liver enzymes (GOT,GPT) in the (Liver,kidney) tissues and on the creatinine Level in the kidney byUtilizing an invivosystem in femalmice.The result showed that inhibition in the activity of GPT and GOT enzymes in theLiver and in both nickel (II) complex and cyclophosphamide drug (CP) . mice weretreated with three doses (90,180,320) µg/mouse for three days for each group.The Liver show's the highest rate of GPT inhibition was about 97.43% at180µg/mouse regarding the ki
... Show MoreThis work aims to detect the associations of C-peptide and the homeostasis model assessment of beta-cells function (HOMA2-B%) with inflammatory biomarkers in pregnant-women in comparison with non-pregnant women. Sera of 28 normal pregnant women at late pregnancy versus 27 matched age non-pregnant women (control), were used to estimate C-peptide, triiodothyronine (T3), and thyroxin (T4) by Enzyme-linked-immunosorbent assay (ELISA), fasting blood sugar (FBS) by automatic analyzer Biolis 24i, hematology-tests by hematology analyzer and the calculation of HOMA2-B% and homeostasis model assessment of insulin sensitivity (HOMA2-S%) by using C-peptide values instead of insulin. The comparisons, correlations, regression analysis tests were perfo
... Show MoreThe subject of dumping is considering today one of the subjects in which form an obstruction arise in front of the cycle of growth for some countries , such as the study of dumping is capturing a large attention by the competent because either a big role and effect in growing the economies of nations then the subject of dumping became a field turn around its sides many measures and laws … and may be done resorting to by many states of the world to anti-dumping as approach of determent weapon delimit the impact of dumping and gives the national agriculture sector the opportunity for rising and growing so this section of international economics is capturing a special importance and represent in same time an important
... Show MoreResearch aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a number of academics professionals experts, in addition to financial analysts and have concluded a set of conclusions , the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve
... Show MoreThe current research aims to determine the intellectual security and the psychological resilience of Secondary school students and how these two variables are related to each other. The study also seeks the extent to which psychological resilience contributes to intellectual security
The research sample consisted of (420) students from the Secondary stage in the Directorate of Education of Baghdad / Rusafa III. Two scales were administered to the participants to collect the needed data. As for the analysis of data, Pearson correlation coefficient, T-test, and the Regression analysis were employed, the results revealed:
- The members of the sample have an intellectual Security.
- The members of the sample have
Vehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi
... Show MoreIn this work, a simple and new method is proposed to simultaneously improve the physical layer security and the transmission performance of the optical orthogonal frequency division multiplexing system, by combining orthogonal frequency division multiplexing technique with chaotic theory principles. In the system, a 2-D chaotic map is employed. The introduced system replaces complex operations such as matrix multiplication with simple operations such as multiplexing and inverting. The system performance in terms of bit error rate (BER) and peak to average ratio (PAPR) is enhanced. The system is simulated using Optisystem15 with a MATLAB2016 and for different constellations. The simulation results showed that the BE
... Show More