Preferred Language
Articles
/
uRcw8I0BVTCNdQwCSylL
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes delay and discontinuity of data flow. To overcome delay or interruption problems, we utilized the Software-Defined Network (SDN), Machine Learning (ML), and Blockchain (BC) techniques, which support the Tor network to intelligently speed up exchanging the public key via the proactive processing of the Tor network security management information. Consequently, the combination network (ITor-SDN) keeps data flow continuity to a Tor client. We simulated and emulated the proposed network by using Mininet and Shadow simulations. The findings of the performed analysis illustrate that the proposed network architecture enhances the overall performance metrics, showcasing a remarkable advancement of around 55%. This substantial enhancement is achieved through the seamless execution of the innovative ITor-SDN network combination approach.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
A New Efficient Hybrid Approach for Machine Learning-Based Firefly Optimization
...Show More Authors

     Optimization is the task of minimizing or maximizing an objective function f(x) parameterized by x. A series of effective numerical optimization methods have become popular for improving the performance and efficiency of other methods characterized by high-quality solutions and high convergence speed. In recent years, there are a lot of interest in hybrid metaheuristics, where more than one method is ideally combined into one new method that has the ability to solve many problems rapidly and efficiently. The basic concept of the proposed method is based on the addition of the acceleration part of the Gravity Search Algorithm (GSA) model in the Firefly Algorithm (FA) model and creating new individuals. Some stan

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Secure Location Privacy Transmitting Information on Cellular Networks
...Show More Authors

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s

... Show More
View Publication
Scopus (27)
Crossref (8)
Scopus Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
A Review of Flow Migration Through Mobile Networks
...Show More Authors

      The interesting new sources of data for official statistics are cell phone data. Electronic media has defined the way of research human behavior rapidly over the last decade. As data storage and sensing technology progressed, electronic records now cover a diverse variety of human activities from localized data (phone) to open source contributions on Wikipedia and the Open Area Map. Electronic records now encompass the numerous fields of activity. The ad hoc vehicle network is a research community-based wireless technology for the implementation of intelligent transport applications. It is necessary to estimate migration flows and predict future trends to understand the causes and effects of migration and to enforce policies t

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Endodontics
Synthesis and Preliminary Evaluation of a Polyolefin-based Core for Carrier-based Root Canal Obturation
...Show More Authors

Introduction: Carrier-based gutta-percha is an effective method of root canal obturation creating a 3-dimensional filling; however, retrieval of the plastic carrier is relatively difficult, particularly with smaller sizes. The purpose of this study was to develop composite carriers consisting of polyethylene (PE), hydroxyapatite (HA), and strontium oxide (SrO) for carrier-based root canal obturation. Methods: Composite fibers of HA, PE, and SrO were fabricated in the shape of a carrier for delivering gutta-percha (GP) using a melt-extrusion process. The fibers were characterized using infrared spectroscopy and the thermal properties determined using differential scanning calorimetry. The elastic modulus and tensile strength tests were dete

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Optimized Zero and First Order Design of Micro Geodetic Networks
...Show More Authors

Precision is one of the main elements that control the quality of a geodetic network, which defines as the measure of the network efficiency in propagation of random errors. This research aims to solve ZOD and FOD problems for a geodetic network using Rosenbrock Method to optimize the geodetic networks by using MATLAB programming language, to find the optimal design of geodetic network with high precision. ZOD problem was applied to a case study network consists of 19 points and 58 designed distances with a priori deviation equal to 5mm, to determine the best points in the network to consider as control points. The results showed that P55 and P73 having the minimum ellipse of error and considered as control points. FOD problem was applie

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Prediction Unconfined Compressive Strength for Different Lithology Using Various Wireline Type and Core Data for Southern Iraqi Field
...Show More Authors

Unconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria.  Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core.  Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um

... Show More
View Publication Preview PDF
Crossref (1)
Crossref