Preferred Language
Articles
/
Loa3pIYBIXToZYALlJzc
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.

Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile Position Estimation using Artificial Neural Network in CDMA Cellular Systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile position estimation using artificial neural network in CDMA cellular systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Mobile position estimation using artificial neural network in CDMA cellular systems
...Show More Authors

Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The result

... Show More
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Mobile-based Human Emotion Recognition based on Speech and Heart rate
...Show More Authors

Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to   record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
The Impact of COVID-19 on Healthy Related Issues, A structured Review
...Show More Authors

Coronavirus: (COVID-19) is a recently discovered viral disease caused by a new strain of coronavirus.

The majority of patients with corona-virus infections will have a mild-moderate respiratory disease that recovers without special care. Most often, the elderly, and others with chronic medical conditions such as asthma, coronary disease, respiratory illness, and malignancy are seriously ill.

    COVID-19 is spread mostly by salivary droplets or nasal secretions when an infected person coughs or sneezes.

    COVID-19 causes severe acute respiratory illness (SARS-COV-2). The first incidence was recorded in Wuhan, China, in 2019.  Since then it spreads leading to a pandemic.

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
Design Mobile Application for Blood Donation System
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Evaluation of petrophysical Properties of Zubair formation Luhais oil field Using Well Logging Analysis and Archie Parameters
...Show More Authors

well log analysis is used to determine the rock properties like porosity, water saturation, and shale volume. Archie parameters in Archie equation, which sometimes considered constants greatly affect the determination of water saturation, also these parameters may be used to indicate whether the rocks are fractured or not so they should be determined. This research involves well logging analysis for Zubair formation in Luhais field which involves the determination of Archie parameters instead of using them as constant.

The log interpretation proved that the formation is hydrocarbon reservoir, as it could be concluded from Rwa (high values) and water saturation values (low values), the lithology of Zubair from cro

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 28 2022
Journal Name
F1000research
In vitro apical microleakage evaluation for different endodontic sealers by spectrophotometric analysis: an observational study
...Show More Authors

Background: It has been established that several filling techniques can affect apical leakage, which is responsible for 59% of endodontic failures. The primary goal of endodontic therapy is to create a tight seal that aids in repairing the periapical tissues, prevents apical periodontitis, and shields against root canal infection. The study aims to compare the apical sealing ability of epoxy resin based sealer  (AH plus), which is an epoxy-resin-based root canal sealer, GuttaFlow 2, which is a silicone-based root canal sealer, GuttaFlow bioseal is a bioactive glass-based root canal sealer, TotalFill HiFlow bioceramic (BC) sealer is a silicate-based root canal sealer (bioceramic sealer) using a single cone techn

... Show More
View Publication Preview PDF
Crossref (2)
Crossref