Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
مجلة ميسان للدراسات الأكاديمية
Natural Fibers Reinforcement Of Denture Base Materials: Natural Wool Reinforcement:, A Review Of Literature
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 24 2022
Journal Name
Healthcare
Incidence of Gingival Black Triangles following Treatment with Fixed Orthodontic Appliance: A Systematic Review
...Show More Authors

This systematic review aimed to investigate the relation between orthodontic treatment (OT) and the incidence of the gingival black triangle (GBT) after completing treatment with a fixed orthodontic appliance, as well as the associated risk factors and the level of alveolar bone. Electronic and hand searches were conducted in three electronic databases for relevant articles published up to March 2022. Retrieved articles went through a two-step screening procedure, and the risk of bias (RoB) was assessed by the Joanna Briggs Institute checklists. The incidence of GBT after OT was set as the primary outcome, while the secondary outcomes were the risk factors associated with GBT and alveolar bone loss following OT. Out of 421 papers, 5

... Show More
View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The 31th Minisymposium
Towards the Requirement-Driven Generation and Evaluation of Hyperledger Fabric Network Designs
...Show More Authors

View Publication
Crossref
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Economics And Administrative Sciences
Use projection pursuit regression and neural network to overcome curse of dimensionality
...Show More Authors

Abstract

This research aim to overcome the problem of dimensionality by using the methods of non-linear regression, which reduces the root of the average square error (RMSE), and is called the method of projection pursuit regression (PPR), which is one of the methods for reducing dimensions that work to overcome the problem of dimensionality (curse of dimensionality), The (PPR) method is a statistical technique that deals with finding the most important projections in multi-dimensional data , and With each finding projection , the data is reduced by linear compounds overall the projection. The process repeated to produce good projections until the best projections are obtained. The main idea of the PPR is to model

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Nov 03 2023
Journal Name
Lecture Notes In Electrical Engineering
Towards Space Sensor Network and Internet of Things: Merging CubeSats with IoT
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Thu Jul 31 2025
Journal Name
Lecture Notes In Networks And Systems
Integration Between Network Analysis and Business Process Reengineering and Their Role in Reduce Project Costs/Applied Research in the Oil Projects Company
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
2008 Ieee International Joint Conference On Neural Networks (ieee World Congress On Computational Intelligence)
Linear block code decoder using neural network
...Show More Authors

View Publication
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FILTRATION MODELING USING ARTIFICIAL NEURAL NETWORK (ANN)
...Show More Authors

In this research Artificial Neural Network (ANN) technique was applied to study the filtration process in water treatment. Eight models have been developed and tested using data from a pilot filtration plant, working under different process design criteria; influent turbidity, bed depth, grain size, filtration rate and running time (length of the filtration run), recording effluent turbidity and head losses. The ANN models were constructed for the prediction of different performance criteria in the filtration process: effluent turbidity, head losses and running time. The results indicate that it is quite possible to use artificial neural networks in predicting effluent turbidity, head losses and running time in the filtration process, wi

... Show More
View Publication Preview PDF
Crossref