Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 03 2016
Journal Name
Technology Reports Of Kansai University
Some statistical results for solution type of the Inequalities system
...Show More Authors

Publication Date
Wed Dec 12 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Quality of Life for Parents of Autistic Child
...Show More Authors

Objectives: The study aims to assess the QOL for parents of a child with autism Methodology: A descriptive study was conducted on parents of autistic child in Baghdad city. A purposive (non-probability) sample of (156) parents, (78) mothers and (78) fathers of (78) autistic children who are clients and receive care in the private specialization centers for autism were selected to participated in the current study. The study used a self- administrative questionnaire for data collection. Results: The findings indicated that both parents (mothers and fathers) were participated in this study, and they comprised

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 06 2021
Journal Name
Iraqi Journal Of Science
TOPSIS with Multiple Linear Regression for Multi-Document Text Summarization
...Show More Authors

The huge amount of information in the internet makes rapid need of text
summarization. Text summarization is the process of selecting important sentences
from documents with keeping the main idea of the original documents. This paper
proposes a method depends on Technique for Order of Preference by Similarity to
Ideal Solution (TOPSIS). The first step in our model is based on extracting seven
features for each sentence in the documents set. Multiple Linear Regression (MLR)
is then used to assign a weight for the selected features. Then TOPSIS method
applied to rank the sentences. The sentences with high scores will be selected to be
included in the generated summary. The proposed model is evaluated using dataset

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Simulation of Fraunhofer Diffraction for Plane Waves using Different Apertures
...Show More Authors

In this paper a two dimensional numerical simulation have been applied using
MATLAB program for generating Fraunhofer diffraction pattern from different
apertures. This pattern is applied for three types of apertures, including, circular,
square, and rectangular functions, and it's could be generated any wavelength in the
visible light. The studying demonstrated the capability and the efficiency of optical
imaging systems to observe a point source at very long distance. The circular
aperture shows better results across the shape of Fraunhofer pattern and optical
transfer function (otf). Also, the minimum values of the normalized irradiance of
different diffracted apertures have been computed at different dimension

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
using collocation method for solving differential equations with time lag
...Show More Authors

in this paper the collocation method will be solve ordinary differential equations of retarted arguments also some examples are presented in order to illustrate this approach

View Publication Preview PDF
Publication Date
Sun Sep 22 2019
Journal Name
Baghdad Science Journal
Estimation of Survival Function for Rayleigh Distribution by Ranking function:-
...Show More Authors

In this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using   is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jul 29 2018
Journal Name
Iraqi Journal Of Science
Cuneiform Tablets Image Preprocessing Proposed Algorithms Techniques for Pattern Recognition
...Show More Authors

Cuneiform symbols recognition represents a complicated task in pattern recognition  and image analysis as a result of problems that related to cuneiform symbols like distortion and unwanted objects that associated with applying Binrizetion process like spots and writing lines. This paper aims to present new proposed algorithms to solve these problems for reaching uniform results about cuneiform symbols recognition that related to (select appropriate Binerized method, erased writing lines and spots) based on statistical Skewness measure, image morphology and distance transform concepts. The experiment results show that our proposed algorithms have excellent result and can be adopted

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Fixed Point Theorem for Set Valued Mapping with Rational Condition
...Show More Authors

In this paper, we generalized the principle of Banach contractive to the relative formula and then used this formula to prove that the set valued mapping has a fixed point in a complete partial metric space. We also showed that the set-valued mapping can have a fixed point in a complete partial metric space without satisfying the contraction condition. Additionally, we justified an example for our proof.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Thermal Performance Analysis of Compact Heat Exchangers for Thermoelectric Generators
...Show More Authors

The efficiency of internal combustion engines (ICE) is usually about thirty percent of the total energy of the fuel. The residual energy is lost in the exhaust gas, the lubrication, and the cooling water in the radiators. Recently much of the researcher’s efforts have focused on taking advantage of wasted energy of the exhaust gas. Using a thermoelectric generator (TEG) is one of the promising ways. However, TEG depends entirely on the temperature difference, which may be offered by the exhaust muffler. An experimental test has been conducted to study the thermal performance of a different muffler internal design. The researchers resort to the use of lost energy in an ICE using TEG, which is one of the ways to take adv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Exact Stiffness Matrix for Nonprismatic Beams with Parabolic Varying Depth
...Show More Authors

In this paper, an exact stiffness matrix and fixed-end load vector for nonprismatic beams having parabolic varying depth are derived. The principle of strain energy is used in the derivation of the stiffness matrix.
The effect of both shear deformation and the coupling between axial force and the bending moment are considered in the derivation of stiffness matrix. The fixed-end load vector for elements under uniformly distributed or concentrated loads is also derived. The correctness of the derived matrices is verified by numerical examples. It is found that the coupling effect between axial force and bending moment is significant for elements having axial end restraint. It was found that the decrease in bending moment was
in the

... Show More
View Publication Preview PDF
Crossref