Preferred Language
Articles
/
Koa2pIYBIXToZYALd5zD
Proposed emerged and enhanced routing protocols for wireless networks
...Show More Authors

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as DS-ZRP routing protocol. The third proposed routing protocol is designed based on using the advantaged of multipoint relays in OSLR protocol with the advantages of route cashing in DSR protocol, and we named it as OLS-DSR routing protocol. Then, some experimental tests are doing by demonstration case studies and the experimental results proved that our proposed routing protocols outperformed than current wireless routing protocols in terms of important network performance metrics such as periodical broadcast, network control overhead, bandwidth overhead, energy consumed and latency.

Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of The College Of Languages (jcl)
Evaluating the Proposed Curriculum of TEFL for First Intermediate Class Students in AL-Muthannah Governorate for the Second Semester/2007-2008
...Show More Authors

During the 1970s, communicative view of language teaching began to be incorporated into syllabus design. The central question for the proponents of this view was: what does the learner want/need to do with the target language? This lead to the emergence of a teaching method (or approach) called communicative language teaching (CLT) during the late 1970s and early 1980s focusing on the functions that must be incorporated into a classroom. According to Brown (2001:43) CLT is a unified but broadly based, theoretically well informed set of tenets about the nature of language and of language learning and teaching. Harmer (2001:84) states that the communicative approach is the name which was given to a set of beliefs which included not only a

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Using Fuzzy Games Theory to Determine the optimal Strategy for The Mobile Phone Networks in The Baghdad And Basra governorates
...Show More Authors

      The objective of this research is employ the special cases of  function  trapezoid in the composition of fuzzy sets to make decision within the framework of the theory of games traditional to determine the best strategy for the mobile phone networks in the province of  Baghdad and Basra, has been the adoption of different periods of the  functions belonging to see the change happening in the matrix matches and the impact  that the strategies  and decision-making  available to each player and the impact on  societ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Journal Mustansiriyah Of Sports Science
The Effect of Ocular Reflex Exercises Using a Proposed Device on Eyes - Hands Coordination for Junior Boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Mar 01 2017
Journal Name
Superlattices And Microstructures
Enhanced photoelectrochemical performance of ZnO nanorod arrays decorated with CdS shell and Ag2S quantum dots
...Show More Authors

View Publication
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Jan 05 2025
Journal Name
Science Journal Of University Of Zakho
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
...Show More Authors

Due to the large population of motorway users in the country of Iraq, various approaches have been adopted to manage queues such as implementation of traffic lights, avoidance of illegal parking, amongst others. However, defaulters are recorded daily, hence the need to develop a mean of identifying these defaulters and bring them to book. This article discusses the development of an approach of recognizing Iraqi licence plates such that defaulters of queue management systems are identified. Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically ra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
N – Topological Space and Its Applications in Artificial Neural Networks
...Show More Authors

   In this paper we give definitions, properties and examples of the notion of  type Ntopological space. Throughout this paper  N is a finite positive  number, N 2. The task of this paper is to study and investigate some properties of such spaces with the existence of a relation between this space and artificial Neural Networks (NN'S), that is we applied the definition of this space in computer field and specially in parallel processing

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 15 2019
Journal Name
Al-khwarizmi Engineering Journal
Rheological and Thermal Properties of Lubricating Oil Enhanced by the Effect of CuO and TiO2 Nano-Additives
...Show More Authors

The specifications of lubricating oil are fundamentally the final product of materials that have been added for producing the desired properties. In this research, spherical nanoparticles copper oxide (CuO) and titanium oxides (TiO2) are added to SAE 15W40 engine oil to study the thermal conductivity, stability, viscosity of nano-lubricants, which are prepared at different concentrations of 0.1%, 0.2%, 0.5%, and 1% by weight, and also their pour point, and flash point as five quality parameters. The obtained results show that CuO nanoparticles in all cases, give the best functionality and effect on engine oil with respect to TiO2. With 0.1 wt. % concentration, the thermal conductivity of CuO/oil and TiO2/

... Show More
View Publication Preview PDF
Crossref (25)
Crossref