Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 29 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Image Fusion Techniques: A Review
...Show More Authors

Image Fusion is being used to gather important data from such an input image array and to place it in a single output picture to make it much more meaningful & usable than either of the input images. Image fusion boosts the quality and application of data. The accuracy of the image that has fused depending on the application. It is widely used in smart robotics, audio camera fusion, photonics, system control and output, construction and inspection of electronic circuits, complex computer, software diagnostics, also smart line assembling robots. In this paper provides a literature review of different image fusion techniques in the spatial domain and frequency domain, such as averaging, min-max, block substitution, Intensity-Hue-Saturation(IH

... Show More
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Mon Jul 11 2022
Journal Name
Aip Conference Proceedings
Gas lift optimization: A review
...Show More Authors

Optimization of gas lift plays a substantial role in production and maximizing the net present value of the investment of oil field projects. However, the application of the optimization techniques in gas lift project is so complex because many decision variables, objective functions and constraints are involved in the gas lift optimization problem. In addition, many computational ways; traditional and modern, have been employed to optimize gas lift processes. This research aims to present the developing of the optimization techniques applied in the gas lift. Accordingly, the research classifies the applied optimization techniques, and it presents the limitations and the range of applications of each one to get an acceptable level of accura

... Show More
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jul 11 2022
Journal Name
Aip Conference Proceedings
Well placement optimization: A review
...Show More Authors

Optimization of well placement plays a considerable role in the production and maximizing the net present value of the investment of oil field developments. However, the application of the optimization techniques in well placement developments is so complicated because many decision variables, objective functions, and constraints are involved in the well placement optimization case. Furthermore, many computational techniques; conventional and non-conventional, have been utilized to optimize well placement operations. This study displays the advancement of the optimization methods applied in the well placement. Subsequently, the study assorted the applied optimization methods, and it demonstrates the restriction and the range of implementati

... Show More
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Ieee Communications Letters
Modified Blind Source Separation for Securing End-to-End Mobile Voice Calls
...Show More Authors

View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Study Impact of Unified Power Flow Controller (UPFC) on a Transmission Line Performance under Different Loading Conditions
...Show More Authors

Now-a-days the Flexible AC Transmission Systems (FACTS) technology is very effective in improving the power flow along the transmission lines and makes the power system more flexible and controllable. This paper deals with the most robust type of FACTS devices; it’s a Unified Power Flow Controller (UPFC). Many cases have been taken to study how the system behaves in the presence and absence of the UPFC under normal and contingency conditions. The UPFC is a device that can be used to improve the bus voltage, increasing the loadability of the line and reduce the active and reactive power losses in the transmission lines, through controlling the flow of real and reactive power. Both the magnitude and the phase angle of th

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
Big Data Approch to Enhance Organizational Ambidexterity An Exploratory Study of a Sample of Managers at ASIA Cell For Mobile Telecommunication Company in Iraq
...Show More Authors

               The research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell  Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.

The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After  a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jan 10 2024
Journal Name
The American Journal Of Interdisciplinary Innovation And Research
SUBJECT: REVIEW METHODS OF DETECTING SUGAR IN A SAMPLE
...Show More Authors