Preferred Language
Articles
/
yBg-W5QBVTCNdQwCSgWd
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.

Scopus Crossref
View Publication
Publication Date
Sun Sep 11 2022
Journal Name
Electronics
IoT-Based Motorbike Ambulance: Secure and Efficient Transportation
...Show More Authors

The predilection for 5G telemedicine networks has piqued the interest of industry researchers and academics. The most significant barrier to global telemedicine adoption is to achieve a secure and efficient transport of patients, which has two critical responsibilities. The first is to get the patient to the nearest hospital as quickly as possible, and the second is to keep the connection secure while traveling to the hospital. As a result, a new network scheme has been suggested to expand the medical delivery system, which is an agile network scheme to securely redirect ambulance motorbikes to the nearest hospital in emergency cases. This research provides a secured and efficient telemedicine transport strategy compatible with the

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The effect of context on some Quranic methods
...Show More Authors

Each book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Journal Of The College Of Languages (jcl)
Notes on Deletion Not Dependent on Linguistic Context
...Show More Authors

The aim of this paper is to examine cases of deletion not dependent on linguistic context. Perlmutter (1971) claims that any sentence other than an imperative1 in which there is an S that does not contain a subject in the surface structure is ungrammatical. Dillon (1978) counts elliptical sentences such as ^ Beg your pardon2 as grammatically incomplete (and hence as strictly ungrammatical). Such statements are, however, not without problems for reasons that will be given below.

View Publication Preview PDF
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Cultural context and its implications for graphic design
...Show More Authors

dictates the need to study the cultural aspects of the context and the consequent relations between the person and the objective environment surrounding him, as the philosophical understanding of the role of culture has led to the emergence of new theoretical interpretations of design that are organically linked with the development of society, especially that the development of the human environment philosophically and culturally is linked to the philosophical perception of its role in Culture as a precondition for new theoretical interpretations of design.
From the above, this problem can be studied by defining the following question (What are the implications of the cultural context in graphic design)?
The research included

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 15 2021
Journal Name
Palarch's Journal Of Archaeology Of Egypt/egyptology
Belief and practice in the teaching of pronunciation in the Iraqi EFL context
...Show More Authors

IH Abdul-Abbas, QJ Rashid, M RasimYounus, PalArch's Journal of Archaeology of Egypt/Egyptology, 2021 - Cited by 9

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
اخفاء البیانات في الملف الصوتي من نوع موجة(wave): اخفاء البیانات في الملف الصوتي من نوع موجة(wave)
...Show More Authors

الخلاصة:
ة k تعتبر عملیة تشفیر البیانات الصوتیة من التكنولوجیا المألوفة لخزن ونقل الاشارات الصوتیة. العلامة المائی
ات k اق المعلوم k مح بالح k ذا تس k وتیة وھك k ارات الص k طة الاش k ة بواس k ات المنقول k تعطي القوة في عدم التحسس بوجود البیان
القیمة بالمحتوى مثل اسم المؤلف او الفنان او حقوق الطباعة المتعلقة بالبیانات.
ة k وع موج k ن ن k وتي م k ف ص k ي مل k ص ف k وع ن k ن ن k ة م k ة المائی k اء العلام k نة لاخف k ة محس k ث خوارز

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Al-kindy College Medical Journal
Radiological Significance of Shear-Wave Elastography Technique for Evaluation of Solid Breast Masses with Histopathological Correlation
...Show More Authors

Background: Although various imaging modalities are available for evaluating suspicious breast lesions, ultrasound-based Shear-Wave Elastography (SWE) is an advanced, non-invasive technique complementary to grayscale sonography. This technique evaluates the elasticity of a specific tissue by applying sonic pressure to that tissue.

Objective: The aim is to assess the role of SWE in evaluating solid breast masses in correlation to histopathological study results.

Subjects and Methods: This prospective study was done in a tertiary care teaching hospital from September 2019 to August 2020. A study population of 50 women aged 18 years or above with an

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref