Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the energy required by the drone to use the technology. A finite number of states have been designed to include a larger range of wireless network techniques, enabling the drones to be recognized while they are further away and in remote areas. This is achieved by including other means of RF channels, such as 4G/5G, Automatic Dependent Surveillance-Broadcast (ADS-B), long range Internet of things (IoT), and satellite communications, in the suggested ER-ID algorithm of this study. The introduced algorithm is tested via a case study. The results showed the ability to detect drones using all types of available radio frequency communication systems (RF-CS) while also minimizing the consumed energy. Hence, the authorities can control the licensed drones by using available RF-CS devices, such as Bluetooth and Wi-Fi, which are already widely used for mobile phones, as an example.
Background: It has been well known that the success of mandibular implant- retained overdenture heavily depends on initial stability, retention and long term osseointegration this is might be due to optimal stresses distribution in surrounding bones. Types of mandibular implant- retained overdenture anchorage system and number of dental implants play an important role in stresses distribution at the implant-bone interface. It is necessary to keep the stresses below the physiologic tolerance level of the bone .since. And it is difficult to measure these stresses around bone in vivo. In the present study, finite element analysis used to study the stresses distribution around dental implant supporting Mandible implant retained overdenture Mate
... Show MoreIn this ˑwork, we present theˑ notion of the ˑgraph for a KU-semigroup as theˑundirected simple graphˑ with the vertices are the elementsˑ of and weˑˑstudy the ˑgraph ofˑ equivalence classesˑofˑ which is determinedˑ by theˑ definition equivalenceˑ relation ofˑ these verticesˑ, andˑ then some related ˑproperties areˑ given. Several examples are presented and some theorems are proved. Byˑ usingˑ the definitionˑ ofˑ isomorphicˑ graph, ˑwe showˑ thatˑ the graphˑ of equivalence ˑclasses ˑand the ˑgraphˑof ˑa KU-semigroup ˑ areˑ theˑ sameˑ, in special cases.
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreWere arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution to chose the suggested market to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms
... Show MoreThe study addressed the water ecosystems of the marshes of Maysan Governorate as one of the important areas in Iraq in terms of the environmental, economic and tourism aspects. This area was exposed to great environmental changes due to natural and human factors which greatly affected the water ecosystem and made the area susceptible to many problems that affected the biological life of living organisms. The marshes of Maysan Governorate was affected by vital factors and non-vital factors. The marshes of Maysan Governorate was characterized by the UN Organization as one of the most important centers of biodiversity in the world because of the abundance of different and rare living organisms such as birds, fish, and reptiles as well as the e
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show More