Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 29 2020
Journal Name
International Journal Of Simulation: Systems, Science & Technology
A New Compact Microstrip Antenna for WSN Applications
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
International Journal Of Innovative Computing, Information And Control
ITTP: A new transport protocol for VoIP applications
...Show More Authors

View Publication
Scopus (14)
Scopus
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Development A Method For Production Of Carbon Nanotubes
...Show More Authors

In this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also fou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Microprocessors And Microsystems
Design considerations for a microprocessor-based Doppler radar
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Apr 17 2023
Journal Name
Wireless Communications And Mobile Computing
A Double Clustering Approach for Color Image Segmentation
...Show More Authors

One of the significant stages in computer vision is image segmentation which is fundamental for different applications, for example, robot control and military target recognition, as well as image analysis of remote sensing applications. Studies have dealt with the process of improving the classification of all types of data, whether text or audio or images, one of the latest studies in which researchers have worked to build a simple, effective, and high-accuracy model capable of classifying emotions from speech data, while several studies dealt with improving textual grouping. In this study, we seek to improve the classification of image division using a novel approach depending on two methods used to segment the images. The first

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
A comparison Some of Methods for Estimating Survival Function for Truncated Exponential Distribution
...Show More Authors

Exponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.

In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood  methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 30 2020
Journal Name
The Asian Esp Journal
A Linguistic Study of ''and'' (و) in Arabic and English.
...Show More Authors

The conjunctive ''and'' and its Arabic counterpart ''و'' are discourse markers that express certain meanings and presuppose the presence of other elements in discourse. They are indispensable aids to both the text writers and readers. The present study aims to show that such cohesive ties help the writer to organize his main argument and communicate his ideas vividly and smoothly. They also serve as explicit signals that help readers unfold text and follow its threads as realized in the progression of context. The researcher has utilized the Quirk Model of Semantic Implication for data analysis. A total of 42 (22 for English and 20 for Arabic) political texts selected from different elite newspapers in both Arabic and English for the analy

... Show More
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 11 2002
Journal Name
Iraqi Journal Of Laser
The Use of a Pulsed Nd: YAG Laser Radiation for the Removal of Intracanal Debris and Smear Layer in Extracted Human Teeth
...Show More Authors

The efficiency of Nd:YAG laser radiation in removing debris and smear layer from prepared root
canal walls was studied. Fifty-seven human extracted single rooted anterior teeth were divided into three
groups. A group that was not lased is considered as a control group. The remaining teeth were exposed to
different laser parameters regarding laser energy, repetition rate and exposure time. For the case of the set of
parameters of 7 mJ laser energy, the cleaning was maximum at 3 p.p.s. repetition rate for 3 seconds exposure
time for, the coronal, middle and apical thirds. Above and below this energy level, there was an overdose
(melting) or under dose (no effect). Nevertheless for 10mJ laser energy case, the cleaning effi

... Show More
View Publication Preview PDF