Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.
Abstract
The government spending in Iraq and witnessed the changes and developments, especially after 2003, which outweighed consumer spending at the expense of capital expenditure and increased support and diversity of trends towards improving pension conditions for member
... Show MoreThe research dealt with the study of choice between a range of different words between the repetitive texts in the verses of the Koran and explain the reason behind this choice, and how the context has the greatest impact in this choice, and that each word in the Koran was placed in the most appropriate place, which can not be replaced by equivalent words, whatever The degree of similarity between them in the indication of the other because it remains at the end that each of those vocabulary synonyms are indicative, the first of them especially that makes the possibility of replacing them with the equivalent vocabulary impossible, and the second general significance and this connotation makes them share with their peers In one aspect of
... Show MoreNS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.
Background: Data on the impact of neonatal and total pediatric admissions volume on neonatal mortality are sparse. Objectives: This study is done to estimate the neonatal mortality in relation to neonatal admissions and to total hospital admissions in Al-Alwyia Pediatric Teaching Hospital through years 2005-2012 Type of the study: A retrospective study.Methods: statistical records of all cases admitted to APTH were studied during 2005-2012.Results: Neonatal mortality decreased to the nadir at last year of study period (2012) and reached 6.1% of neonatal admissions compared to 2005 level which was 9.7 %. Mortality rate among premature and low birth weight (LBW) infants decreased also. The study also reveals that neonatal mortality constit
... Show MoreThe aim of this work is to evaluate the onc-electron expectation values < r > from the radial electronic density funetion D(r) for different wave ?'unctions for the 2s state of Li atom. The wave functions used were published in 1963,174? and 1993 , respectavily. Using " " ' wave function as a Slater determinant has used the positioning technique for the analysis open shell system of Li (Is2 2s) State.
The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show MoreMaintaining and breeding fish in a pond are a crucial task for a large fish breeder. The main issues for fish breeders are pond management such as the production of food for fishes and to maintain the pond water quality. The dynamic or technological system for breeders has been invented and becomes important to get maximum profit return for aquaponic breeders in maintaining fishes. This research presents a developed prototype of a dynamic fish feeder based on fish existence. The dynamic fish feeder is programmed to feed where sensors detected the fish's existence. A microcontroller board NodeMCU ESP8266 is programmed for the developed h
... Show MoreMost intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt