Preferred Language
Articles
/
ijs-6462
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fully Automated Magnetic Resonance Detection and Segmentation of Brain using Convolutional Neural Network
...Show More Authors

     The brain's magnetic resonance imaging (MRI) is tasked with finding the pixels or voxels that establish where the brain is in a medical image The Convolutional Neural Network (CNN) can process curved baselines that frequently occur in scanned documents. Next, the lines are separated into characters. In the Convolutional Neural Network (CNN) can process curved baselines that frequently occur in scanned documents case of fonts with a fixed MRI width, the gaps are analyzed and split. Otherwise, a limited region above the baseline is analyzed, separated, and classified. The words with the lowest recognition score are split into further characters x until the result improves. If this does not improve the recognition s

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
Effects of the Changes in the Neutron Number of Isotonic Nuclei on the Tow-Component Partial Level Density Formula Corrected for Pairing in Pre-Equilibrium Reactions
...Show More Authors

Ericson’s formula describes the partial level density (PLD) of pre-equilibrium reactions and corrections. PLD with pairing correction can be calculated using four methods, namely, pairing, improved pairing, exact Pauli and back shift energy corrections. The variations in the PLD values of each of the four formulas of strontium (88Sr), Yttrium (89Y) and Zirconium (90Zr) isotones have been examined. Results shows that the PLD values that use pairing and improved pairing corrections do not vary for different isotones. However, a small change in PLD values is observed when exact Pauli correction and back shift energy were utilised. The change in the PLD values using back shift energy correction is bigg

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Journal Of Engineering
Prediction of Shear Strength Parameters of Gypseous Soil using Artificial Neural Networks
...Show More Authors

The shear strength of soil is one of the most important soil properties that should be identified before any foundation design. The presence of gypseous soil exacerbates foundation problems. In this research, an approach to forecasting shear strength parameters of gypseous soils based on basic soil properties was created using Artificial Neural Networks. Two models were built to forecast the cohesion and the angle of internal friction. Nine basic soil properties were used as inputs to both models for they were considered to have the most significant impact on soil shear strength, namely: depth, gypsum content, passing sieve no.200, liquid limit, plastic limit, plasticity index, water content, dry unit weight, and initial

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Level of Educational Supervisors' Practices of Their Supervisory Duties According to The Requirements of Comprehensive Quality in Oman
...Show More Authors

The research aims to identify the level of educational supervisors' practices of their supervisory duties according to the requirements of comprehensive quality from the viewpoint of teachers in Oman. Moreover, identify the differences between the responses of the sample about these practices, which are attributed to gender, and years of experience. Thus, a questionnaire was administered to teachers, consisting of (48) items distributed on (5) main fields related to the educational supervisor's practices. The sample consisted of (220) teachers who were randomly chosen from the schools in Dhofar region. Data were analyzed using means, standard divisions, T-test, and One Way ANOVA. The research concluded that the level of educational super

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 31 2018
Journal Name
Iraqi Journal Of Science
Estimation of Groundwater recharge by groundwater level fluctuation method of Dibdibba aquifer at ‎Karbala- Najaf plateau, central of Iraq
...Show More Authors

Groundwater recharge estimation is essential for management of groundwater systems.  As groundwater is a vital source of water for domestic and agricultural activities in the study area (Karbala - Najaf plateau), ‎where the Dibdibba aquifer represents the primary and essential aquifer, evaluation of groundwater recharge is critical in the study area. A wide range of methodologies exists for estimating recharge.‎ ‎The water-table fluctuation method strategy might be the most generally utilized system for estimating recharge; it requires learning of changes in water levels over time and specific yield. Advantages of this approach include its simplicity and an insensitivity to the mechanism by which water moves through the unsatu

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 07 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Determination of the effect of stress on the salivary cortisol level among sample of university students having myofacial pain
...Show More Authors

Background: Psychological stress is considered the major etiological factor precipitating myofacial pain and temporomandibular disorders.It is known that stress induce various adaptational responses of physiologic systems. The process includes increase in the activity of the hypothalamic-pituitary-adrenal axis which promotes cortisol secretion. Salivary cortisol has been used as a measure of free circulating cortisol levels.The use of salivary biomarkers has gained increased popularity since collecting samples is non-invasive and painless. The aim of thisstudy was to evaluate the level of cortisol in saliva among sample of university students having myofacial pain, during the final exam period and whether this finding could have a significa

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Decorative aesthetic aspects and their use in Islamic architecture
...Show More Authors

The architecture of the richly decorated mosques demonstrated that the Islamic culture is one of the most significant and greatest civilizations in the history of humanity. The plant decorative units are one of the key areas in which the Muslim artist excelled. As a result, he created various plant forms that he took from nature, which led him to invent the arabesque art consisting of plant motifs with curved and rounded lines or wrapped between them. These shapes with curved borders include leaves, twigs, and flowers. Buildings and artefacts from the nineteenth century AD have this shape. they achieved their objectives during the twelfth and thirteenth centuries. There was another kind of vegetable decorative unit, made up of stems and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
SMS Spam Detection Using Multiple Linear Regression and Extreme Learning Machines
...Show More Authors

     With the growth of the use mobile phones, people have become increasingly interested in using Short Message Services (SMS) as the most suitable communications service. The popularity of SMS has also given rise to SMS spam, which refers to any unwanted message sent to a mobile phone as a text. Spam may cause many problems, such as traffic bottlenecks or stealing important users' information. This paper,  presents a new model that extracts seven features from each message before applying a Multiple Linear Regression (MLR) to assign a weight to each of the extracted features. The message features are fed into the Extreme Learning Machine (ELM) to determine whether they are spam or ham. To evaluate the proposed model, the UCI bench

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref