Preferred Language
Articles
/
Loa3pIYBIXToZYALlJzc
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.

Scopus Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Solutions and Recent Challenges Related to Energy in Wireless Body Area Networks with Integrated Technologies: Applications and Perspectives
...Show More Authors

          In this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or   physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communic

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2017
Journal Name
2017 9th Computer Science And Electronic Engineering (ceec)
Modelling the power cost and trade-off of live migration the virtual machines in cloud-radio access networks
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algo

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Measurement and analysis of financial liberalization in Iraq
...Show More Authors

Abstract :                                                                                                            

In light of the trend of the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Relationship marketing orientation to improve the quality of service applied research in some Iraqi mobile phone companice
...Show More Authors

      This research is based on  interaction of two most important variables to the business organizations in the current era ,  these two variables are (marketing orientation and quality of service),  this research is trying to urge the service organizations to reconsider the mechanisms adopted in the formulation of its plans, It was the application of research in Korek Telecom and Asia Cell Telecom as a sector of service active and important in the business sector in Iraq, the information was obtained through the design of the Likert questionnaire , it was distributed (92) questionnaire , (50) for the company Korek Telecom and (42) of the Asia-Cell and represent research population sample

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
6G Wireless Communications Networks: A Comprehensive Survey
...Show More Authors

View Publication
Scopus (376)
Crossref (362)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Economic Feasibility of the beekeeping project Using the method of mobile promiscuous
...Show More Authors

               An update of our research is the first to develop and reform the agricultural sector . and promoting production and productivity of this sector multi-sources , which is the management and beekeeping one source . Been applied to the style of beekeeping mobile promiscuous includes twentieth cell in the Iraqe project of mussiab . in which there exist a variety of crops and trees .

Experiment had proved successful and led to raise the level of npoduction of single Dell of the honey to 49 kg over the previous year and surpassed the average production percell in the province of Babylon , which the amount of 13.945 kg , another

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
Research on the book observatories walls in doctrinal issues Written by Imam Sana Allah bin Ali bin Khalil (1137 AH)
...Show More Authors

The topic of the research on the Observatory of the Walls on Jurisprudential Matters in the Hanafi Fiqh, by Imam San’a Allah bin Ali bin Khalil Al-Ala’iyya Wai al-Naqshbandi, al-Rumi, who died in 1137 AH, which includes seven chapters, the first section of it concerning division and related matters, and the second section in the adaptation It is the apportionment of benefits in common objects, the third section, which pertains to lines, surfaces, and bodies, the fourth section, which concerns the inclined wall and certification, and the fifth section, which concerns the provisions of the walls and its claims, and the sixth section, which concerns the door of roads and doors, the opening of the skylight, the sails of the wing, the can

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Oct 15 2014
Journal Name
International Journal Of Advanced Research
A survey/ Development of Passive Optical Access Networks Technologies
...Show More Authors

The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad

... Show More
View Publication Preview PDF