research centers


Search results: Found 16

Listing 1 - 10 of 16 << page
of 2
>>
Sort by

Article
Proposed Secure Method for Web of Things Purposes
طريقة آمنة مقترحة لاغراض شبكة الاشياء

Authors: Rehab F. Hassan رحاب حسن --- Shatha Habeeb شذى حبيب
Journal: Iraqi Journal of Information Technology المجلة العراقية لتكنولوجيا المعلومات ISSN: 19948638/26640600 Year: 2018 Volume: 8 Issue: 3 اللغة الانكليزية Pages: 128-136
Publisher: iraqi association of information الجمعية العراقية لتكنولوجيا المعلومات

Loading...
Loading...
Abstract

With the increasing number of real world things connected to the web, the web of things has taken on a new significant and importance, attracting significant industry and research interest. Management and control of the proposer access in WOT is important, for this reason security is used to provide good and accurate management and control. In this paper secure method is proposed to control the access in WOT systems. Challenges, Time hash and Signature are used in order to provide good authentication, Encryption and Verification to the access operation and the request and response in WOT environment.

مع الزيادة الحاصلة في الواقع للاشياء المتصلة بالويب , ويب الاشياء امتلك اهمية كبيرة وجذب انتباه الصناعات المهمة واهتمام البحوث . ان ادارة وسيطرة الوصول للاشياء المتصلة بالويب مهم لذلك السبب يتم استخدام الامنية لغرض توفير ادارة جيدة ودقيقة . في هذا البحث طريقة امنية تم اقتراحها للسيطرة على الوصول في نظام الاشياء المتصلة بالويب . ال Challenge وال Time Hash وال Signature تم استخدامهم لغرض توفير تخويل وتشفير وتاكيد لعملية الوصول ومعلومات الطلب والاستجابة في بيئة الاشياء المتصلة بالويب.


Article
LT10 a Lightweight Proposed Encryption Algorithm for IOT

Author: Alaa Q. Raheema
Journal: Iraqi Journal for Computers and Informatics ijci المجلة العراقية للحاسبات والمعلوماتية ISSN: 2313190X 25204912 Year: 2018 Volume: 44 Issue: 1 Pages: 1-5
Publisher: University Of Informatics Technology And Communications جامعة تكنولوجيا المعلومات و الاتصالات

Loading...
Loading...
Abstract

In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bit.


Article
Proposed Lightweight Protocol for IoT Authentication

Author: Hiba A. Taresh
Journal: Iraqi Journal for Computers and Informatics ijci المجلة العراقية للحاسبات والمعلوماتية ISSN: 2313190X 25204912 Year: 2018 Volume: 44 Issue: 1 Pages: 27-33
Publisher: University Of Informatics Technology And Communications جامعة تكنولوجيا المعلومات و الاتصالات

Loading...
Loading...
Abstract

The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communicate with different questions through the worldwide framework of remote/wired Internet. The correspondence system among an expansive number of asset obliged gadgets that produce substantial volumes of information affects the security and protection of the included items. In this paper, we propose a lightweight protocol for IoT authentication which based on two algorithms LA1 and RA1 which is used for authentication and generating session key that is used for encryption.


Article
Towards an Optimized Smart Campus Framework with three Layers (OSCF-L3)
نحو هيكلية مجمع جامعي ذكي بتقنية تعدد الطبقات (OSC-L3)

Authors: Nada M. Alhakkak --- Ban Salman
Journal: Journal of Baghdad College of Economic sciences University مجلة كلية بغداد للعلوم الاقتصادية الجامعة ISSN: 2072778X Year: 2018 Volume: 2018 Issue: 7 Pages: 242-250
Publisher: Baghdad College of Economic Sciences كلية بغداد للعلوم الاقتصادية

Loading...
Loading...
Abstract

The use of modern technological devices has changed the way users interact with their university environment. Smart campus differ from traditional campus it depends on cloud computing and internet of things to connect its parts, this paper proposes an optimized smart campus framework for all types of individuals or users that enables the users of the campus to interact with each other using its main services. The proposed framework OSCF-L3 is a layered structure work. The proposed framework is interacted with the some of the main factors that affect smart campus performance

ان استخدام الاجهزة الالكترونية الحديثة و تعدد استعمالاتها في العصر الحديث ادى بالتالي الى التغيير بالطرق التي يتعامل بها المستخدمون مع المحيط الجامعي بشكل عام.و تختلف المجمعات الجامعية الذكية عن سواها من المجمعات الجامعية التقليدية بكونها تعتمد في اساس عملها على الحوسبة السحابية و انترنت الاشياء لأغراض التعامل و التفاعل مع الخدمات المقدمة للمستخدمين.في هذا البحث نقدم مقترحا لأطار عمل يخص مجمع جامعي ذكي يكون فيه التعامل و الاستفادة من الخدمات المتاحة الكترونيا لعدة انواع من المستفيدين ، ضمن الاطار الجامعي (الطلبة، الاساتذة ، الموظفين و غيرهم).ان اطار العمل المقترح OSCF-L3 هو في اساسه يعتمد على تقنية الانظمة متعددة الطبقات والذي تم اعتماد تصميمه على اهم العناصر الاساسية للمجمعات الجامعية الذكية المعتمدة في الوقت الحالي.


Article
Overview for Internet of Things: Basics, Components and Applications
نظرة عن أنترنيت الأشياء و أسسه و مكوناته و تطبيقاته

Loading...
Loading...
Abstract

There are significant developments in the field of remote sensing, communications, and control in the world today. The Internet of Things (IoT) is the result of cooperation between them. It is a system of interconnected computing devices, mechanical and digital machines, and things that are capable of sensing and are able to communicate with each other and with machines linked to a network intelligently to take advantage of the data collected through the sensors imbedded into devices. The resulting data can be collected and analyzed in order to reveal insights and propose measures that will produce cost savings, increase efficiency or improve products and services. As IoT is expected to grow and spread rapidly in the coming years, this will improve the quality of consumers' lives and productivity of enterprises. The future is the IoT, which will change the real world objects to smart virtual entities. It is one of the platforms of smart modern cities and intelligent power management systems. This research aims to provide a comprehensive review of the IoT, its main components, and architecture, along with its applications, features and challenges.

إنترنت الأشياء هو نظام من الأجهزة المترابطة الحوسبة، والآلات الميكانيكية والرقمية، والأشياء التي هي قادرة على الاستشعار وقادرة على التواصل مع بعضها البعض والاستفادة من البيانات التي تم جمعها وتحليلها من أجل الكشف عن رؤى واقتراح الإجراءات التي سوف تنتج وفورات في التكاليف، وزيادة الكفاءة أو تحسين المنتجات والخدمات.من المتوقع نموه بسرعة مستقبلا ، وهذا سوف يطلق العنان لبعد جديد من الخدمات التي من شأنها تحسين نوعية حياة المستهلكين وإنتاجية المؤسسات.أن المستقبل هو إنترنت الأشياء، والذي سيغير العالم الحقيقي للاشياء إلى أشياء افتراضية ذكية. مما يتيح لنا مراقبة الأشياء من حولنا،. أن أنترنيت الأشياء هي واحدة من منصات من المدن الذكية اليوم، وأنظمة إدارة الطاقة الذكية. الهدف الرئيسي من هذه الورقة هو تقديم لمحة عامة عن إنترنت الأشياء و فهمه، و هيكليته و مكوناته أضافة الى التطبيقات و الخصائص والتحديات .


Article
A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment

Authors: Maytham Azhar --- Amin H. Seno
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2019 Volume: 37 Issue: 5part (A) Engineering Pages: 172-180
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

In the Internet of Things (IoT) systems, large amounts of data areaccumulated from anywhere at any time, which may attack individuals' privacy,especially when systems are utilized in medical and everyday environments. With thepromise of IoT's proactive systems, the integration of smart things into standardInternet creates several security challenges, because most Internet technologies,communication protocols and sensors are not designed to support IoT. Recentresearch studies have shown that launching security / privacy attacks against IoTactive systems, in particular, Wearable Medical Sensor (WMS) systems, may lead tocatastrophic situations and life-threatening conditions. Therefore, security threatsand privacy concerns in the IoT area should be actively studied. This causes us inthis paper to create a privacy authentication protocol for IoT end-devices on a fourlayer structure that does not have the ability to accurately identify the device ofrequest's sender so that some attacks can be minimized. We used the Blakley Sharingscheme to design a key generation and distribution system for secure communicationsbetween edge devices and end devices and examined the security properties of theprotocol for the five common attacks in the IoT. The results of the experiments showthat the proposed authentication protocol by the Blakley method is more efficient withincreasing number of instructions in both fog structures and in a without fogstructure, which shows a higher flexibility of the Blakley method than the Schemerbecause of the increasing number of instructions indicating increasing the number ofnodes in the network. The proposed method has better performance.


Article
Wireless Sensor Network for Medical Applications

Authors: Hanady S.Ahmed --- Abduladhem Abdulkareem Ali
Journal: Iraqi Journal for Electrical And Electronic Engineering المجلة العراقية للهندسة الكهربائية والالكترونية ISSN: 18145892 Year: 2015 Volume: 11 Issue: 1 Pages: 49-59
Publisher: Basrah University جامعة البصرة

Loading...
Loading...
Abstract

This work presents a healthcare monitoring system that can be used in an intensive care room. Biologicalinformation represented by ECG signals is achieved by ECG acquisition part . AD620 Instrumentation Amplifierselected due to its low current noise. The ECG signals of patients in the intensive care room are measured throughwireless nodes. A base node is connected to the nursing room computer via a USB port , and is programmed with aspecific firmware. The ECG signals are transferred wirelessly to the base node using nRF24L01+ wireless module.So, the nurse staff has a real time information for each patient available in the intensive care room. A starWireless Sensor Network is designed for collecting ECG signals . ATmega328 MCU in the Arduino Uno boardused for this purpose. Internet for things used For transferring ECG signals to the remote doctor, a Virtual PrivetNetwork is established to connect the nursing room computer and the doctor computer . So, the patientsinformation kept secure. Although the constructed network is tested for ECG monitoring, but it can be used tomonitor any other signals.


Article
The Role and Important of Internet of Things in Building Sustainable City

Authors: Nahla F. Alwan --- Muna K. AL-Nuaimi
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2018 Volume: 36 Issue: 1 Part (C) Pages: 22-29
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Every year many people migrate from country to city to live there. Thiswill load a big pressure on the whole living in the city, Baghdad city also sufferfrom this problem in addition to other found problems like energy consumption ,waste accumulate , Traffic congestion, noise, environmental pollution. To offer agood sustainable future living to population without any damage to environmentand to solve many problems , one can use internet of things which is theconnection network of the things especially with high spread of networks nowwhich Internet of things based on it .the purpose of this research is to explaininternet of things (IoT) and its role in solving many problems in the city , by usingof the data collect by internet of things and to respond in real time to knowproblems and to enable planning and building city in a valuable sustainable way .As well as to explain the concept and models of smart city and its relationship tothe sustainable city and Internets of things. In addition, to demonstrate in asimplified way the possibility of using the Internet of things to solve the problemsin the Baghdad city and to raise the standard of life of its inhabitant is in asustainable smart way. Taking this in the strategic planning of Baghdad city.


Article
Routing with Energy Threshold for WSN-IoT Based on RPL Protocol

Authors: Abdulkareem Abdulrahman Kadhim --- Sarah Ammar Rafea
Journal: IRAQI JOURNAL OF COMPUTERS,COMMUNICATION AND CONTROL & SYSTEMS ENGINEERING المجلة العراقية لهندسة الحاسبات والاتصالات والسيطرة والنظم ISSN: 18119212 Year: 2019 Volume: 19 Issue: 1 Pages: 71-81
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Internet of Things (IoT) enables things to have connectivity throughthe internet. The number of things is growing fast and has to be uniquelyidentified through the Internet to communicate with other things. In WirelessSensor Networks (WSNs) each node can be considered as a thing. WSN noderesources are very limited due to the need to communicate using low power andusually through unreliable links. Such limitations need an energy efficientrouting protocol. WSN is considered as a type of Low power and LossyNetwork (LLN). The routing protocol for low power and lossy network (RPL)is being adopted for LLN and has been standardized to enable connectivity ofWSN over IoT. RPL constricted a topology similar to tree topology. Nodes inRPL optimized its path using an objective function (OF). OF depends ondifferent node/link metrics in the optimization process. In this paper, an EnergyThreshold RPL (ETRPL) protocol is proposed. ETRPL depends on a newobjective function to enhance energy consumption of RPL protocol by takinginto account the remaining energy of the preferred parent node. ETRPL isimplemented using Cooja simulator. The results show that ETRPL provides anincrease in the remaining energy of at least 87.4% for a small area with highnumber of nodes. ETRPL also performed better with regards to Time Delay,Packet Reception Ratio, and the number of dead nodes in a small area. For alarge area, the performance is not encouraging. Thus the proposed ETRPLprotocol is useful for IoT networks with relatively small areas.


Article
Big Data Techniques: A Survey

Authors: Jamal N. Hasoon جمال ناصر حسون --- Assist. Prof. Dr. Rehab Hassan د. رحاب فليح حسن
Journal: Iraqi Journal of Information Technology المجلة العراقية لتكنولوجيا المعلومات ISSN: 19948638/26640600 Year: 2019 Volume: 9 Issue: 4 Pages: 135-146
Publisher: iraqi association of information الجمعية العراقية لتكنولوجيا المعلومات

Loading...
Loading...
Abstract

Big data refer to the large volume of data, it can be analyzed for strategic Developing and better decisions. Big Data applications exaggerate in near few years because a traditional data techniques be limited specification. Various types of distributions and technologies used to suffer the Big Data challenges are developed. A survey of recent technologies are review for Big Data. The main technologies features are studied enable to extract knowledge from Big Data. Such distributions have some limitations and may differ in offerings and capacities. The used technologies face the increasing multi-streams and Big Data challenges. In this work review the big data technologies and challenge.

Keywords

Big Data --- Map --- Reduce --- Shuffle --- Hadoop --- HDFS --- YARN --- Internet of Things --- IoT

Listing 1 - 10 of 16 << page
of 2
>>
Sort by
Narrow your search

Resource type

article (16)


Language

English (15)


Year
From To Submit

2019 (3)

2018 (9)

2017 (2)

2015 (1)

2014 (1)