Preferred Language
Articles
/
jxYZ14kBVTCNdQwCFI0h
A Preliminary Study and Implementing Algorithm Using Finite State Automaton for Remote Identification of Drones
...Show More Authors

Electronic remote identification (ER-ID) is a new radio frequency (RF) technology that is initiated by the Federal Aviation Authorities (FAA). For security reasons, traffic control, and so on, ER-ID has been applied for drones by the FAA to enable them to transmit their unique identification and location so that unauthorized drones can be identified. The current limitation of the existing ER-ID algorithms is that the application is limited to the Wi-Fi and Bluetooth wireless controllers, which results in a maximum range of 10–20 m for Bluetooth and 50–100 m for Wi-Fi. In this study, a mathematical computing technique based on finite state automaton (FSA) is introduced to expand the range of the ER-ID RF system and reduce the energy required by the drone to use the technology. A finite number of states have been designed to include a larger range of wireless network techniques, enabling the drones to be recognized while they are further away and in remote areas. This is achieved by including other means of RF channels, such as 4G/5G, Automatic Dependent Surveillance-Broadcast (ADS-B), long range Internet of things (IoT), and satellite communications, in the suggested ER-ID algorithm of this study. The introduced algorithm is tested via a case study. The results showed the ability to detect drones using all types of available radio frequency communication systems (RF-CS) while also minimizing the consumed energy. Hence, the authorities can control the licensed drones by using available RF-CS devices, such as Bluetooth and Wi-Fi, which are already widely used for mobile phones, as an example.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Nov 21 2018
Journal Name
International Journal Of Control, Automation And Systems
Design and Stability Analysis of a Fractional Order State Feedback Controller for Trajectory Tracking of a Differential Drive Robot
...Show More Authors

View Publication
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 20 2019
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE WATER ECOSYSTEM OF THE MARSHES OF MAYSAN GOVERNORATE USING REMOTE SENSING AND GIS
...Show More Authors

The study addressed the water ecosystems of the marshes of Maysan Governorate as one of the important areas in Iraq in terms of the environmental, economic and tourism aspects. This area was exposed to great environmental changes due to natural and human factors which greatly affected the water ecosystem and made the area susceptible to many problems that affected the biological life of living organisms. The marshes of Maysan Governorate was affected by vital factors and non-vital factors. The marshes of Maysan Governorate was characterized by the UN Organization as one of the most important centers of biodiversity in the world because of the abundance of different and rare living organisms such as birds, fish, and reptiles as well as the e

... Show More
Publication Date
Wed Apr 10 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
QUALITY SYSTEMS.POSSIBILITY OF IMPLEMENTING IN SOME LOCAL FOOD ESTABLISHMENTS: QUALITY SYSTEMS.POSSIBILITY OF IMPLEMENTING IN SOME LOCAL FOOD ESTABLISHMENTS
...Show More Authors

In order to have an idea about what happens in Iraqi food establishments in relation to implement quality management system ISO 9001, this study was performed to show the actual situation of Iraqi food establishments concerning quality management system (ISO 9001:2015), reasons of implementing, factors that hinder implementing and problems faced high administration for getting establishments certification ISO 9001:2015. The study demonstrated from the questionnaire some difficulties to implement ISO 9001 for both of establishments that implemented the quality system or which in implementing of this international standard. The most important problems during implementing were business culture and costs and the most important proble

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
A hybrid feature selection technique using chi-square with genetic algorithm
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Voprosy Istorii
Changing the agricultural map of Diyala Governorate for the years (1980, 1990, 2000, 2010, 2020) using GIS and remote sensing
...Show More Authors

Abstract. Geographical and remote sensing, which gave a picture of the change in the area of agricultural land in the study area for selected years (1980, 1990, 2000, 2010, 2020). In particular and Iraq in general, as this led to a reduction in the areas of agricultural lands and in return an increase in arid lands and their desertifica- tion and the loss of their productive value, which as a result leads to the migration of the population, the change of land sex, the failure to achieve food security and dependence on the import of the food basket.

Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using modern techniques for determining the location of marketing outlet for product of the state company for vegetables oil
...Show More Authors

Were arranged this study on two sections, which included first section comparison between markets proposed through the use of transport models and the use of the program QSB for less costs , dependant the optimal solution  to chose the suggested market  to locate new market that achieve lower costs in the transport of goods from factories (ALRasheed ,ALAmeen , AlMaamun ) to points of sale, but the second part has included comparison of all methods of transport (The least cost method ,Vogels method , Results Approximations method , Total method) depending on the agenda of transport, which includes the market proposed selected from the first section and choose the way in which check the solution first best suited in terms

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref