Preferred Language
Articles
/
yBg-W5QBVTCNdQwCSgWd
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.

Scopus Crossref
View Publication
Publication Date
Fri Jun 08 2018
Journal Name
Advances In Intelligent Systems And Computing
Improve Memory for Alzheimer Patient by Employing Mind Wave on Virtual Reality with Deep Learning
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (16)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Aerosol Science
On the design of miniature parallel-plate differential mobility classifiers
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Temperature Dependence of Hall Mobility AndCarrier Concentration of pb0.55S0.45 Films
...Show More Authors

Measurements of Hall effect properties at different of annealing temperature have been made on polycrystalline Pb0.55S0.45 films were prepared at room temperature by thermal evaporation technique under high vacuum 4*10-5 torr . The thickness of the film was 2?m .The carrier concentration (n) was observed to decrease with increasing the annealing temperature. The Hall measurements showed that the charge carriers are electrons (i.e n-type conduction). From the observed dependence on the temperature, it is found that the Hall mobility (µH), drift velocity ( d) carrier life time ( ), mean free path (?) were increased with increasing annealing temperature

View Publication Preview PDF
Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Characteristic Behavior of Ion Acoustic Wave in A dusty Plasma
...Show More Authors

In this research, we make an attempt to derive theoretically 1-D linear dispersion relation of ion-acoustic waves in uniform unmagnetized dusty plasma valid in the long wavelength limits. This equation matched previously special equation of acoustic modes of a general form in magnetized dusty plasma.  Depending on previously mentioned experimental data, we numerically consider various parameters that affect the properties of these waves in   dusty plasma. The study has shown that the presence of dust grains is to modify the properties of ion acoustic waves and affect the behavior of the plasma in which they are immersed.  

View Publication Preview PDF
Publication Date
Mon May 02 2022
Journal Name
Lark Journal
Iraq Wars: From A literary text to Social Context
...Show More Authors

This article investigates Iraq wars presentation in literature and media. The first section investigates the case of the returnees from the war and their experience, their trauma and final presentation of that experience. The article also investigates how trauma and fear is depicted to create an optimized image and state of fear that could in turn show Iraqi society as a traumatized society. Critics such as Suzie Grogan believes that the concept of trauma could expand to influence societies rather than one individual after exposure to trauma of being involved in wars and different major conflicts. This is reflected in Iraq as a country that was subjected to six comprehensive conflicts in its recent history, i.e. less than half a century; th

... Show More
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
اخفاء البیانات في الملف الصوتي من نوع موجة(wave): اخفاء البیانات في الملف الصوتي من نوع موجة(wave)
...Show More Authors

الخلاصة:
ة k تعتبر عملیة تشفیر البیانات الصوتیة من التكنولوجیا المألوفة لخزن ونقل الاشارات الصوتیة. العلامة المائی
ات k اق المعلوم k مح بالح k ذا تس k وتیة وھك k ارات الص k طة الاش k ة بواس k ات المنقول k تعطي القوة في عدم التحسس بوجود البیان
القیمة بالمحتوى مثل اسم المؤلف او الفنان او حقوق الطباعة المتعلقة بالبیانات.
ة k وع موج k ن ن k وتي م k ف ص k ي مل k ص ف k وع ن k ن ن k ة م k ة المائی k اء العلام k نة لاخف k ة محس k ث خوارز

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 05 2025
Journal Name
Wasit Journal Of Sports Sciences
The impact of the Needham model on learning the skills of dribbling and handling in football for students
...Show More Authors

View Publication