Preferred Language
Articles
/
JhfwV5MBVTCNdQwCitFT
Investigation over Efficient Broadcasting Mechanism in MANET

Mobile ad hoc network is nothing but the temporary network which is having the collection of mobile nodes. Routing and broadcasting are major operations of MANET network. The major operation in ad hoc mobile network is the broadcasting which sometime results to storm problem of the broadcast if the forwarding mechanism is not properly designated. Thus the challenges in the MANET are to reduce the broadcasting redundancy and under high transmission error rate provides high delivery ratio. Hence in our proposed research, we are introducing and investigating the new mechanism of broadcasting called Dual Covered Broadcast. This method takes the broadcast redundancy advantage order to improve packet delivery ratio especially under environments where transmission error rate higher. According to proposed approach, among the senders 1-hop neighbors, forwarding nodes which are selected are only retransmit the broadcasting message. There are two ways for selection of forwarding nodes and either of one is used depending on the network conditions. The source node provides forwarding node retransmission as acknowledgement of reception of packet. If the source node not getting the retransmissions of its forwarding nodes, source node resend the packets until the maximum threshold will reach. For the simulation of this project we used the Microsoft .Net framework and our simulation results shows that proposed method performing well under the high transmission error rate. From the simulated results we claim that investigated approach for the broadcasting is more efficient as compared to the existing approaches.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
Efficient Plain Password Cryptanalysis Techniques

In this research work, some low complexity and efficient cryptanalysis approaches are proposed to decrypt password (encryption keys). Passwords are still one of the most common means of securing computer systems. Most organizations rely on password authentication systems, and therefore, it is very important for them to enforce their users to have strong passwords. They usually ignore the importance of usability of the password for the users. The more complex they are the more they frustrate users and they end up with some coping strategies such as adding “123” at the end of their passwords or repeating a word to make their passwords longer, which reduces the security of the password, and more importantly there is no scientific basis

... Show More
Crossref
View Publication Preview PDF
Publication Date
Fri Oct 07 2016
Journal Name
Fourth International Conference On Wireless And Optical Communications, 2016, Beijing, China
ESAM: Endocrine inspired Sensor Activation Mechanism for multi-target tracking in WSNs

Target tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr

... Show More
Scopus (8)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Dec 14 2018
Journal Name
Journal Of Legal Sciences
Authentic Judgments in the Judiciary International Criminal Court And its implementation mechanism

      بعد الانتهاء من مرحلة المحاكمة وصيرورة الحكم نهائياً  فى المحاكم الجنائية الدولية ، تأتي مرحلة تنفيذ هذه الاحكام التي تصدرها المحكمة، ومدى حجيتها ازاء القضاء الوطني ، واستنادًا إلى مبدأ التكامل فإن الأحكام التي تصدرها المحكمة الجنائية الدولية يكون لها الحجية إزاء القضاء الوطني، وإزاء المحكمة الجنائية الدولية ذاتها؛ حيث لا يجوز محاكمة الشخص عن الجريمة ذاتها مرتين سواءً أمام المحكمة ال

... Show More
Crossref
View Publication
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
the mechanism of employing the numbered personality in structuring scientific imaginary movies

The researcher chose her research which is imprinted ( the mechanism of employing the numbered personality in structuring scientific imaginary movies) because it’s found in modern employing of the numbered personalities of the movies that are designed by computers which made the directors and the producers to exploit these numbered development technologies in designing numbered personalities, in order to make them heroes instead of the actual actors in the cinema scene, it’s divided the research to five chapters, the first chapter, the methodical fine which includes, the problem of the research, the aim of the research includes, the importance of the research and it’s details, and the chapter concludes limiting the important terms,

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Role & Mechanism of Market Makers in Iraqi Stock Market: "Proposal Frame"

This researchable paper aims to focus of the role & mechanism of market makers in Iraqi stock market through analyzing its role in other Arabian as well as global stock ones, especially in current period through activate the use of bonds, shares, and trying to create a continued price balance. Then decreasing the opportunity having gaps between highest and lowest level without reasonable causes. In addition trying to deactivate the common decision without supported information. Moreover, this paper aims to explain the rules of increasing liquidity and having balance to lead the market into positive direction.  Thus, for achieving the above-mentioned requirements, such conditions should be underlined by market makers as well as t

... Show More
Crossref
View Publication
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
The mechanism of irony in political discourse: Механизм иронии в политическом дискурсе

         The present paper sheds light on irony as one of the most important and most common linguistic phenomena in modern linguistics, in general ,and in discourse in particular, whether it is (political, literary, journalistic, etc.). When irony is used correctly or positively, it paves the way for the speaker to gain the approval of other parties participating in the dialogue and dissolve barriers between them. It is a simple multi-functional linguistic style and an expression of one’s meaning by using language that normally signifies the opposite according to the context and the situation. Therefore, it is necessary to study its characteristics, define its functions and traces the extent of

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Mar 12 2017
Journal Name
Al-academy
Polarization and the mechanism of communication in the form of industrial products (green)

Our research which is under the name "Polarization and Communication mechanism in the formation of green industrial products " The problem of the research focuses in identifying what is polarization and its function mechanisms , by displaying the inventive and creative cases of the designer in how to exploit the industrial products and its recycling process to attract the user and recipient by asserting on the values of beauty of the appearance of the industrial product with the attraction Of the user and the recipient with the new function of that product and how its different from the function achieved by the old product , with consideration of nature and its preservation . The results of the research were as following : The designer e

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
Efficient Method for Color Iris Localization

Iris detection is considered as challenging image processing task. In this study efficient method was suggested to detect iris and recognition it. This method depending on seed filling algorithm and circular area detection, where the color image converted to gray image, and then the gray image is converted to binary image. The seed filling is applied of the binary image and the position of detected object binary region (ROI) is localized in term of it is center coordinates are radii (i.e., the inner and out radius). To find the localization efficiency of suggested method has been used the coefficient of variation (CV) for radius iris for evaluation. The test results indicated that is suggested method is good for the iris detection.

View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Sub–Nyquist Frequency Efficient Audio Compression

This paper presents the application of a framework of fast and efficient compressive sampling based on the concept of random sampling of sparse Audio signal. It provides four important features. (i) It is universal with a variety of sparse signals. (ii) The number of measurements required for exact reconstruction is nearly optimal and much less then the sampling frequency and below the Nyquist frequency. (iii) It has very low complexity and fast computation. (iv) It is developed on the provable mathematical model from which we are able to quantify trade-offs among streaming capability, computation/memory requirement and quality of reconstruction of the audio signal. Compressed sensing CS is an attractive compression scheme due to its uni

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Kinetic Mechanism on Thermal Degradation of a Nitrate Ester Propellant

View Publication Preview PDF