Preferred Language
Articles
/
yBg-W5QBVTCNdQwCSgWd
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.

Crossref
View Publication
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network
...Show More Authors

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Motivations of Volunteers in Jordan: An Exploratory Study Based on a Sample of University Students within the Context of their Social Relations
...Show More Authors

Volunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these fun

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 20 2024
Journal Name
Naunyn-schmiedeberg's Archives Of Pharmacology
The potential role of targeting the leptin receptor as a treatment for breast cancer in the context of hyperleptinemia: a literature review
...Show More Authors

Since cancer is becoming a leading cause of death worldwide, efforts should be concentrated on understanding its underlying biological alterations that would be utilized in disease management, especially prevention strategies. Within this context, multiple bodies of evidence have highlighted leptin’s practical and promising role, a peptide hormone extracted from adipose and fatty tissues with other adipokines, in promoting the proliferation, migration, and metastatic invasion of breast carcinoma cells. Excessive blood leptin levels and hyperleptinemia increase body fat content and stimulate appetite. Also, high leptin level is believed to be associated with several conditions, including overeating, emotional stress, inflammation, obesity,

... Show More
View Publication
Clarivate Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
IoT-Smart Agriculture: Comparative Study on Farming Applications and Disease Prediction of Apple Crop using Machine Learning
...Show More Authors

     Recently, the Internet of Things has emerged as an encouraging technology that is scaling up new heights towards the modernization of real word physical objects into smarter devices in several domains. Internet of Things (IoT) based solutions in agriculture drives farming into a smart way through the proliferation of smart devices to enhanced production with minimal human involvement. This paper presents a comprehensive study of the role of IoT in prominent applications of farming, wireless communication protocols, and the role of sensors in precision farming. In this research article, the existing frameworks in IoT-based agriculture systems with relevant technologies are presented. Furthermore, the comparative analysis of the a

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
IoT-Key Agreement Protocol Based on The Lowest Work-Load Versions of The Elliptic Curve Diffie-Hellman
...Show More Authors

     A key agreement protocol (KAP) is a fundamental block in any cryptosystem since it ensures secure communication between two parties. Furthermore, KAP should include advanced features in limited-resource environments such as IoT, in which this protocol must be lightweight and efficient in consuming resources. Despite the Elliptic Curve Diffie-Hellman (ECDH) algorithm having often been considered efficient in providing an acceptable security degree with less resource consumption, it has suffered from weakness against Man-In-The-Middle Attacks (MITMA). This paper presents two versions of the Variant Elliptic Curve Diffie-Hellman (VECDH) algorithms as a key agreement protocol. The security analysis indicates that the proposed algori

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Reduction of the error in the hardware neural network
...Show More Authors

Specialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Classification of Rural Road Network in Al-Najaf Governorate
...Show More Authors

This study has dealt with, the issue of classification of rural road network , in addition to prepare a suggested for the classification for this network in Iraq , this classification account , the specifications and characteristics of rural roads, population, and the range taking of settlements , then this classification was applied on the rural road network in the Najaf province there are four categories of classification ,the first is major arterial rural roads divided into two major arterial and minor arterial roads , while the second category collected roads which was divided into minor arterial roads and main collected roads. The third category was represented by Local Roads , it has been divided into paved roads and unpaved, the f

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 24 2023
Journal Name
Journal Of Advanced Biotechnology And Experimental Therapeutics
Influence of the high mobility group A1 genetic polymorphism on indices of metabolic syndrome and insulin resistance in the Iraqi population: Case-control study
...Show More Authors

The high mobility group A1 gene (HMGA1) rs139876191 variant has been related to metabolic syndrome and type 2 diabetes, but data are lacking in Middle Eastern populations. The study aimed to assess whether the HMGA1 rs139876191 variant is associated with metabolic syndrome risk and whether this variant predicts the risk of insulin resistance. This case-control study was carried out at single center in Kirkuk city/ Iraq from February to August 2022. Polymorphisms in HMGA1 and genotyping were identified by Sanger sequencing of genomic DNA obtained from 91 Iraqi participants (61 patients with metabolic syndrome and 30 control). Lipid profile, serum (glucose and insulin), glycated hemoglobin, blood pressure, body mass index, and waist circumfer

... Show More
Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Medico-legal Update
Flexible ureterorenoscopy versus extracorporeal shock wave lithotripsy for treatment of lower pole renal stones
...Show More Authors

Scopus (1)
Scopus