Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2016
Journal Name
Journal Of Engineering
Improvement of Traffic Movement for Roads Network in Al-Kadhimiya City Center
...Show More Authors

Numerous regions in the city of Baghdad experience the congestion and traffic problems. Due to the religious and economic significance, Al-Kadhimiya city (inside the metropolitan range of Baghdad) was chosen as study area. The data gathering stage was separated into two branches: the questionnaire method which is utilized to estimate the traffic volumes for the chosen roads and field data collection method which included video recording and manual counting for the volumes entering the selected signal intersections. The stage of analysis and evaluation for the seventeen urban roads, one highway, and three intersections was performed by HCS-2000 software.The presented work plots a system for assessing the level of service

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Strategic agility Dimensions and adapted In business organizations/ Field research analytical in Asiacell Mobile Telecommunications
...Show More Authors

ract

         This reaserch seeks To answer Wondering :(Is there a possibility employ strategic agility In companies sample Serving in Iraq ?)

       This reaserch aims: explore Strategic Agility rely upon Dimensions that interact with each other to form the intcllectual frame Strategic Agility, These dimensions are: (Clarity of vision, Selected

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 11 2024
Journal Name
Journal Of Emergency Medicine, Trauma And Acute Care
Mobile application to develop nurses’ knowledge of pediatric cardiopulmonary resuscitation: A quasi-experimental study
...Show More Authors

Background: Traditional teaching methods of cardiopulmonary resuscitation (CPR) are not effective for most learners today. They may lead to lack of retention of survival skills and poor outcomes. Various methods are adopted to provide optimal, effective, and attractive teaching methods. Application (app)-based teaching can be used as an alternative way for learners to develop their knowledge and skills. Despite the large number of professional and nonprofessional trainee members, the high quality of CPR is still not fulfilled. Technology-based learning can prove to be an effective way to teach medical subjects such as pediatric cardiac resuscitation, which require an optimal teaching environ

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Modified Elman Spike Neural Network for Identification and Control of Dynamic System
...Show More Authors

View Publication
Scopus (25)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Artificial Neural Network and Latent Semantic Analysis for Adverse Drug Reaction Detection
...Show More Authors

Adverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM: THE PROBLEM OF RANDOMSLAUGHTER IN BAGHDAD AND THE POSSIBILITY OF APPLYING MOBILE SLAGHTERHOUSEES TO REDUCE THEM
...Show More Authors

One of the most important elements of achieving food security is livestock, which is an essential element in the agricultural sector, and is one of the state support sectors. Animal production (sheep) ranked an important position in this sector due to the economic advantages that are available when rearing. Moreover, the success and development of sheep breeding depend on several factors, including financial return and achieving profitability. The study aims to identify the phenomenon size of random slaughter as a problem, which spread in Baghdad and its causes and the factors that influencing its development. As well as, the possibility of applying the idea of a​​mobile slaughterhouse to reduce this phenomen

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
مجلة واسط للعلوم الانسانية
Artificial Intelligence in English Language Education in Iraq: A Review study of Interventions and Perceptions
...Show More Authors

AI in teaching English is reshaping language learning. While interest in AI-supported education is growing worldwide, research in this area is still emerging in Iraq. This review synthesizes empirical AI-based intervention studies to enhance English language learning in Iraqi higher education, and the perceptions of stakeholders regarding AI tools in language instruction. The reviewed intervention studies, comprising studies employed different AI platforms to support grammar instruction, speaking fluency, writing feedback, and pragmatic competence. These interventions yielded improvements in learners’ performance, motivation, and communicative confidence. In parallel, perception-focused studies revealed positive attitudes toward A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Sep 28 2024
Journal Name
Journal Of The Pakistan Medical Association
Pulse transmission time and amplitude of digital pulse wave determined by fingertip plethysmography as a surrogate marker of brachial artery flowmediated dilatation
...Show More Authors

Objectives: To assess the changes in blood vessel stiffness and digital pulse wave amplitude because of flowmediateddilatation, and to explore how these two variables change when endothelial dysfunction isexperimentally induced.Method: The experimental study was conducted at the departments of physiology at the College of Medicine,Mustansiriyah University, and the College of Medicine, Al-Iraqia University, Baghdad, Iraq, from October 14, 2021, toMay 31, 2022, and comprised healthy young males who were subjected to the flow-mediated dilatation techniqueon the left brachial artery. Pulse transit time and the amplitude of the digital pulse wave were measured duringreactive hyperaemia for 2.5 minutes from the left middle finger using a

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Syntactic Efforts to The Sheikh Mohammad Muhi Ad-Deen Abdulhameed in Ibin Akeel's Explanation
...Show More Authors

The Arabic language is one of the honoring languages that has a supreme status. Being the language of the Holly Qura'an has increased its refinedness and spread in the Islamic and non-Islamic world. It has become the means of communication and conversation, and the language of knowledge and thought. The multiplicity of its dialects and accents is a sign of its capacity. Many Roman, Persian, and Greek sciences and arts have been translated and Arabicized into it. It has further become the formal language of communication in the world. Many great Arab scholars have played a role in examining it to maintain and elevate it. One of these scholars is the great scientist Mohammad Muhi Ad-Deen Abdulhameed who has done great syntactic efforts in

... Show More
View Publication Preview PDF