Preferred Language
Articles
/
ijs-6462
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put forth and contrasted with the current algorithms at the network level. Elliptic Curve Cryptography combined with the Koblitz encoding technique produced superior results. By implementing machine learning and deep learning techniques, wireless sensor networks are protected against cyber-attacks, and the suggested encryption approach ensures the confidentiality of data transfer. The estimated encryption and decryption times were evaluated with various file sizes and contrasted with the current systems. The suggested solutions were successful in achieving security at both the node level and network level.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
ESTIMATION OF MUNICIPAL SOLID WASTE GENERATION AND LANDFILL VOLUME GENERATION AND LANDFILL VOLUME USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Spe Europec Featured At 81st Eage Conference And Exhibition
Development of Artificial Neural Networks and Multiple Regression Analysis for Estimating of Formation Permeability
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Heuristic Modularity for Complex Identification in Protein-Protein Interaction Networks
...Show More Authors

     Due to the significant role in understanding cellular processes, the decomposition of Protein-Protein Interaction (PPI) networks into essential building blocks, or complexes, has received much attention for functional bioinformatics research in recent years. One of the well-known bi-clustering descriptors for identifying communities and complexes in complex networks, such as PPI networks, is modularity function.   The contribution of this paper is to introduce heuristic optimization models that can collaborate with the modularity function to improve its detection ability. The definitions of the formulated heuristics are based on nodes and different levels of their neighbor properties.  The modulari

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Photonic Sensors
Arsenic Detection Using Surface Plasmon Resonance Sensor With Hydrous Ferric Oxide Layer
...Show More Authors
Abstract<p>The lethality of inorganic arsenic (As) and the threat it poses have made the development of efficient As detection systems a vital necessity. This research work demonstrates a sensing layer made of hydrous ferric oxide (Fe<sub>2</sub>H<sub>2</sub>O<sub>4</sub>) to detect As(III) and As(V) ions in a surface plasmon resonance system. The sensor conceptualizes on the strength of Fe<sub>2</sub>H<sub>2</sub>O<sub>4</sub> to absorb As ions and the interaction of plasmon resonance towards the changes occurring on the sensing layer. Detection sensitivity values for As(III) and As(V) were 1.083 °·ppb<sup>−1</sup> and 0.922 °·ppb<jats></jats></p> ... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Optik
Synthesis and characterization of PVDF/PMMA/ZnO hybrid nanocomposite thin films for humidity sensor application
...Show More Authors

View Publication
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Fri Feb 07 2025
Journal Name
Journal Of Physical Education
The Effect of Breathing Exercises on Relation and Self – Talk on Developing Ambition Level According to VTS – Sport and Achievement in Long Distance Runners
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of Physical Education
The use of physical exercises of mind (knowledge) to develop the level of performance of the rulers of women's football
...Show More Authors

Football from popular task the referees the most important elements this game through this study shows the importance of physical training mental and its effects the level of performance for referees and especially woman referees which entered the game in the newly in our country was used physical exercise mind through films and means to assist through visualization some of the cases do the articles of law and also exercises the evolution of the level of performance of the rulers of woman the research sample 12 of referees certified by the Iraqi central football and referees committee achtbarien was chosen for this study including mental cognitive test approved by the referees committee the second test questionnaire to assess the level of p

... Show More