Preferred Language
Articles
/
7BaMSIcBVTCNdQwCAkGL
Performance Evaluation of Transport Protocols for Mobile Ad Hoc Networks
...Show More Authors

Mobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10, 30 and 50 nodes, respectively using well known Network Simulator (NS-2.35). Moreover, Constant Bit Rate (CBR) considered as a traffic source and On-demand Distance Vector (AODV) as the routing protocol. For evaluation performance, QoS metrics such as end-to-end delay, packet delivery ratio, throughput and jitter are measured. The results show that delay and jitter of TFRC are slightly less than UDP and TCP whereas UDP has the significantly better performance wise throughput.

View Publication
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Wireless Communications And Mobile Computing
Developing a Video Buffer Framework for Video Streaming in Cellular Networks
...Show More Authors

This work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Assessing of the Morphology and Sediment Transport of Diyala River
...Show More Authors

 

Diyala River is one of the important rivers that provide water for the Governorate of Diyala. In this research, the morphology and sediment transport of this river were studied using HEC-Ras software. The selected length of the river in the present study is 193 km and extended from Diyala Weir to the confluence of Tigris River and Diyala River. The fieldwork period extended from June 2020 till August 2020, where suspended-load and bed-load samples were collected and surveyed some cross-sections. The one-dimensional sediment transport model has been calibrated for five years, from 2014 to 2019. The results were compared with the measured cross-sections in 2019,  and the suitable value of (maximum depth

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 02 2021
Journal Name
Humanitarian And Natural Sciences Journal
THE LINGUISTIC STRUCTURES OF THE HISTORIANS ALYAQOUBI (284 AH / 897 AD) ARE A MODEL
...Show More Authors

The research in the linguistic structures of the historians Al-Yaqoubi is considered a model of the important topics in historical studies in general, given its importance in the lives of peoples due to its connotations and meanings that summarize interpretation, clarification, and prolonged speech, as it includes life meanings with many dimensions, these structures have been used in historical incidents Important, and throughout the different ages, as it can be used to support an opinion, solve problems, prove evidence, increase wisdom, and it needs rich life experiences, and a sound language, to use it, and needs a wide absorptive capacity for the recipient, the research included linguistic structures in the achievement of science , Lingu

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The level of evaluation of the educational counselors ’performance as a predictor of their level of satisfaction with their evaluation
...Show More Authors

The current research aims to reveal the level of satisfaction of the mentors with the evaluation of their performance according to gender (male - female) and to formulate the predictive equation for the level of performance (dependent variable) from knowing the level of satisfaction with the evaluation (independent variable). (16 paragraphs) contains alternatives to the answer that measures the level of satisfaction (weak, medium, and high) (1,2,3), that is, with a hypothetical average of (32). It consisted of 100 educational counselors consisting of 45 males and 55 females, the results of the research concluded that the level of satisfaction with performance is below the mean when compared with the hypothetical average of the scale of s

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Performance Evaluation the Turbidity Removal Efficiency of AL-Muthana Water Treatment Plant
...Show More Authors

Turbidity is a visual property of water that expresses the amount of suspended substances in the water. Its presence in quantities more significant than the permissible limit makes the water undrinkable and reduces the effectiveness of disinfectants in treating pathogens. On this basis, turbidity is used as a basic indicator for measuring water quality. This study aims to evaluate the removal efficiency of AL- Muthanna WTP. Water turbidity was used as a basic parameter in the evaluation, using performance improvement evaluation and data from previous years (2016 to 2020). The average raw water turbidity was 26.7 NTU, with a minimum of 14 NTU, with a maximum of 48 NTU. Water turbidity value for 95% of settling daily reading data was

... Show More
Crossref (5)
Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Performance Evaluation the Turbidity Removal Efficiency of AL-Muthana Water Treatment Plant
...Show More Authors

Turbidity is a visual property of water that expresses the amount of suspended substances in the water. Its presence in quantities more significant than the permissible limit makes the water undrinkable and reduces the effectiveness of disinfectants in treating pathogens. On this basis, turbidity is used as a basic indicator for measuring water quality. This study aims to evaluate the removal efficiency of AL- Muthanna WTP. Water turbidity was used as a basic parameter in the evaluation, using performance improvement evaluation and data from previous years (2016 to 2020). The average raw water turbidity was 26.7 NTU, with a minimum of 14 NTU, with a maximum of 48 NTU. Water turbidity value for 95% of settling daily readi

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Practice Periodical On Structural Design And Construction
Reducing Damages to Underground Infrastructure: Performance Evaluation of One-Call Notification Program
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref