Preferred Language
Articles
/
joe-888
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has shown that its execution time fastest among AES, 3DES and DES 15%, 55% and 17%.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Epitoanyag - Journal Of Silicate Based And Composite Materials
Flame retardants, their beginning, types, and environmental impact: a review
...Show More Authors

The current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
The optical properties of a- (GeS2)100-xGax thin films
...Show More Authors

Thin films whose compositions can be expressed by (GeS2)100-xGax (x=0, 6,12,18) formula were obtained by thermal evaporation technique  of bulk material at a base pressure of ~10-5 torr. Optical transmission spectra of the films were taken in the range of 300-1100 nm then the optical band gap, tail width of localized states,  refractive index, extinction coefficient were calculated. The optical constants were found to increase at low concentration of Ga (0 to12%) while they decreases with further addition of Ga. The optical band gap was found to change in opposite manner to that of optical constants. The variation in the optical parameters are explained in terms of average bond energy

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jul 03 2023
Journal Name
Journal Of Polymer & Composites
Metal Complexes of Cephalexin and Their Biological Activities: A Review
...Show More Authors

Cephalexin and its derivatives are commonly utilized in the pharmaceutical and medicinal industry due to their biological and pharmaceutical activities, including anti-microbial, anti-cancer, anti-bacterial, and herbicidal activities as well as possessing high palatability and being useful for skin and joint infections. Interestingly, some organic drugs, including cephalexin, which exhibit toxicological and pharmacological properties, can be administered in forms of metal complexes. Many researchers have synthesized organic ligands derived from cephalexin in forms of Schiff bases and azo compounds which exhibited higher biological and medicinal properties when compared to cephalexin alone. One of the important features that make Schiff base

... Show More
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
A stylistic vision of the objection in the Quranic discourse
...Show More Authors

The modern stylistic lesson has become more committed to the scientific limits in which it believed, and more confident in itself, and it is no longer just a scientific procedure that helps other curricula and sciences that preceded it.

Based on this, our modest research ((a stylistic vision of the objection in the Quranic discourse)) arose to explore an artistic rhetorical phenomenon that was included in the Holy Quran text. ; Because analysis is a situation that allows us to see a lot and absorb the stranger more clearly.

And since the horizontal arrangement of the linguistic elements in which stylistically undistinguished elements meet with distinct ones, the other trend has emerged that believes that the stylistic dis

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Homomorphism of Cubic bipolar ideals of a KU-semigroup
...Show More Authors

The idea of a homomorphism of a cubic set of a KU-semigroup is studied and the concept of the product between two cubic sets is defined. And then, a new cubic bipolar fuzzy set in this structure is discussed, and some important results are achieved. Also, the product of cubic subsets is discussed and some theorems are proved.

Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Materials Chemistry A
A novel approach to fabricate zeolite membranes for pervaporation processes
...Show More Authors

A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.

View Publication
Scopus (28)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Fri Aug 06 2021
Journal Name
Annals Of The Romanian Society For Cell Biology
Versatile Applications of Complexes with Some Lanthanide Elements: A Review
...Show More Authors

Cerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexe

... Show More
Publication Date
Tue Oct 08 2024
Journal Name
Cureus
Orbital Langerhans Cell Histiocytosis: A Systematic Review of 228 Cases
...Show More Authors

View Publication
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Al–bahith Al–a'alami
Correspondents and Professional Standards in News Coverage (A Field Study)
...Show More Authors

         The essence of the new work in the satellite TV channels is to provide news coverage of news that will inform the people of what is going on around them in order to increase their political, social, economic and cultural awareness and this drives them to take positions or certain behaviors on according to what the communicator in these channels wants. News and news reports are generally used as a psychological variable to influence public opinion and does not offer interestingness and information. Therefore, satellite TV channels have assumed special attention towards their correspondents desiring to achieve scoop in news coverage and to have the final word in reading events and install it

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref