Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 20 2019
Journal Name
Iet Circuits, Devices & Systems
Multi‐bit error control coding with limited correction for high‐performance and energy‐efficient network on chip
...Show More Authors

In the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (13)
Crossref (5)
Scopus Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun May 08 2011
Journal Name
Journal Of Planner And Development
the reality of the transportation network in Iraq
...Show More Authors

Transportation network could be considered as a function of the developmental level of the Iraq, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure.
The main theme of this search is to show the characteristics of the regional transportation network in Iraq and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this search tries to draw an imagination for the connection between network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure. This search aiming also to determine the nat

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
The Transition Tectonic Zone Between the Two Parts of the Platform in Iraq: A Review Study
...Show More Authors

The changes of the tectonic boundary locations between the stable and unstable shelf on different version of the tectonic maps of Iraq is discussed. It is found that the location of the boundary varies due to philosophy and the type of the geological parameters. It is used the stratigraphic, geophysical, structural, geochemical, hydrological and others information in delineating the boundary. The deep crustal structures obtained by using gravity data show that the boundary shifted toward the west by about 100 km in southern Iraq. According to the review, and when taking in consideration all the geological and geophysical parameters from the lower crust to the earth surface, it is believed that the boundary is not a line but it is a tecto

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 11 2024
Journal Name
Maaen Journal For Medical Sciences
Pharmacological Supplements Efficacy in Management of chronic pain associated with Sickle Cell Disease: A narrative review
...Show More Authors

Sickle cell disease (SCD) is a hereditary ailment that can cause severe pain and suffering to people who are affected. However, with continued investment in research and treatment options, we can make progress towards improving the lives of those with SCD. Over 40% of patients experience painful vaso-occlusive crises (VOCs), so we must work towards finding solutions and providing support for those living with this condition, These episodes, a hallmark of SCD, significantly contribute to morbidity, mortality, and a diminished quality of life, while also incurring substantial healthcare costs. Chronic pain particularly affects older adolescents and adults with SCD, with over half reporting daily discomfort. Opioid-based analgesics, though sti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Use Dynamic Bayesian network to estimate the reliability of Adamia Water Network
...Show More Authors

Abstract\

In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Galore International Journal Of Health Sciences And Research
Use of Flavonoids and Green Tea Extracts as Antioxidants Induced by Oxidative Stress: A Review Article
...Show More Authors

The aim of this work is to shed light on the importance of medicinal plants, especially those that have extracts that have a direct effect on human health. The study and identification of botany is necessary because human life has become closely linked to the life of plants as food. In addition to using plants as food, primitive man did not stop at this point, but rather developed their use to hunt prey and also used toxic plant materials in wars. With the passage of time, the ancient man was able to link the wild plants that cover the surface of the earth and the diseases that afflict him, so he used these plants or Parts of it are for treatment. A medicinal plant is defined as one or more of its parts that contain one or more chemicals in

... Show More
Preview PDF