Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2024
Journal Name
Folia Medica
Microbial boundaries in peri-implantitis: a review of pathogen-related advances
...Show More Authors

In the field of implantology, peri-implantitis is still a common complication of implant failure. Similar to periodontal disease, this kind of pathological condition is characterized by inflammation of the tissues surrounding dental implants or fillings. The sources of infection have been shown to be chronic periodontitis and poor maintenance of the communion. A thorough examination of the intricate components of peri-implantitis was sought in this review in order to identify common characteristics of the disease with regard to bacteria, biofilm formation, host immunological responses, diagnostic tools, and therapeutic treatments. The aim of this study was to provide a detailed overview of the different bacterial species associated

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of The Mechanical Behavior Of Materials
Simulation and assessment of water supply network for specified districts at Najaf Governorate
...Show More Authors
Abstract<p>This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand </p> ... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 10 2025
Journal Name
Proceedings On Engineering Sciences
WAREHOUSE IN INDUSTRY 4.0 BASED DRONE, COMPUTER VISION, AND ARTIFICIAL INTELLIGENCE TECHNOLOGIES: A LITERATURE REVIEW
...Show More Authors

View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Classification of Arabic Alphabets Using a Combination of a Convolutional Neural Network and the Morphological Gradient Method
...Show More Authors

The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 30 2013
Journal Name
International Journal Of Network Security &amp; Its Applications
Evaluating the Performance of the Secure Block Permutation Image Steganography Algorithm
...Show More Authors

Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Optimization of Drilling Well Design: A Review
...Show More Authors

Drilling well design optimization reduces total Authorization for Expenditures (AFE) by decreasing well constructing time and expense. Well design is not a constant pattern during the life cycle of the field. It should be optimized by continuous improvements for all aspects of redesigning the well depending on the actual field conditions and problems. The core objective of this study is to deliver a general review of the well design optimization processes and the available studies and applications to employ the well design optimization to solve problems encountered with well design so that cost effectiveness and perfect drilling well performance are achievable. Well design optimization processes include unconventional design(slimhole) co

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Dithiocarbamates derivatives as anticancer agents: A Review
...Show More Authors

View Publication
Crossref (8)
Crossref
Publication Date
Wed Jun 02 2021
Journal Name
International Journal Of Drug Delivery Technology
Mixed Ligand Complexes of Trimethoprim: A Review
...Show More Authors

In this research, we highlight the most important research related to the mixed ligand complexes of the drug trimethoprim (TMP), and for the past 7 years where this drug has been used as a chelating ligand and gives stability to the complexes with ions of metal elements where these complexes, prepared and diagnosed, and for some research the bacterial activity was studied against different types of bacteria.

Preview PDF
Publication Date
Fri Jun 25 2021
Journal Name
International Journal Of Drug Delivery Technology
Mixed Ligand Complexes of Trimethoprim: A Review
...Show More Authors

In this research, we highlight the most important research related to the mixed ligand complexes of the drug trimethoprim (TMP), and for the past 7 years where this drug has been used as a chelating ligand and gives stability to the complexes with ions of metal elements where these complexes, prepared and diagnosed, and for some research the bacterial activity was studied against different types of bacteria

View Publication
Scopus (1)
Scopus
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Human Recognition Using Ear Features: A Review
...Show More Authors

Over the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time.  In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D

... Show More
View Publication
Crossref