Preferred Language
Articles
/
RhbhBIcBVTCNdQwCGC1H
Simulation based comparison of routing protocols in wireless multihop adhoc networks
...Show More Authors

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyzed in the presence of varying the number of mobile nodes, pause time, and traffic connection numbers. Moreover, Routing and QoS performance metrics such as normalized routing load, routing packet, packet delivery ratio, packet drop, end-to-end delay, and throughput are measured to conduct a performance comparison between three routing protocols. Simulation results indicate that AODV outperforms the DSDV and AOMDV protocols in most of the metrics. AOMDV is better than DSDV in terms of end-to-end delay. DSDV provides lower throughput performance results. Network topology parameters have a slight impact on AODV Performance.

Crossref
View Publication
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
On Training Of Feed Forward Neural Networks
...Show More Authors

In this paper we describe several different training algorithms for feed forward neural networks(FFNN). In all of these algorithms we use the gradient of the performance function, energy function, to determine how to adjust the weights such that the performance function is minimized, where the back propagation algorithm has been used to increase the speed of training. The above algorithms have a variety of different computation and thus different type of form of search direction and storage requirements, however non of the above algorithms has a global properties which suited to all problems.

View Publication Preview PDF
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation and Simulation in Batch Fermentation of Baker's Yeast Production
...Show More Authors

Baker's Yeast is an important additive among the substances, which improves bred quality, thus, a consideration has been made to study the conditions and parameters that affecting the production of the yeast in a batch fermenter experimentally and theoretically. Experimental runs were implemented in a 12-liter pilot-scale fermenter to predict the rate of growth and other parameters such as amount of additive consumed and the amount of heat generated. The process is modeled and performed using a computer programming prepped for this purpose, the model gave a good agreement comparing to the experimental work specially in the log phase.

View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Numerical Simulation of flow in pipe with cross jet effects
...Show More Authors

A numerical method is developed to obtain two-dimensional velocity and pressure distribution through a cylindrical pipe with cross jet flows. The method is based on solving partial differential equations for the conservation of mass and momentum by finite difference method to convert them into algebraic equations. This well-known problem is used to introduce the basic concepts of CFD including: the finite- difference mesh, the discrete nature of the numerical solution, and the dependence of the result on the mesh refinement. Staggered grid implementation of the numerical model is used. The set of algebraic equations is solved simultaneously by “SIMPLE” algorithm to obtain velocity and pressure distribution within a pipe. In order to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
SECURED SMART CARD SIMULATION
...Show More Authors

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard versi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-nahrain Journal Of Science
Enhancing Sparse Adjacency Matrix for Community Detection in Large Networks
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Value at risk simulation in a fixed return stock portfolio using the Monte Carlo simulation model The concept of a bond portfolio
...Show More Authors

This research aims to predict the value of the maximum daily loss that the fixed-return securities portfolio may suffer in Qatar National Bank - Syria, and for this purpose data were collected for risk factors that affect the value of the portfolio represented by the time structure of interest rates in the United States of America over the extended period Between 2017 and 2018, in addition to data related to the composition of the bonds portfolio of Qatar National Bank of Syria in 2017, And then employing Monte Carlo simulation models to predict the maximum loss that may be exposed to this portfolio in the future. The results of the Monte Carlo simulation showed the possibility of decreasing the value at risk in the future due to the dec

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation of Radial, Real Gas Flow
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Simulation of one Dimensional Photoacoustic Imaging
...Show More Authors

The present work provides theoretical investigation of laser photoacoustic one dimensional imaging to detect a blood vessel or tumor embedded within normal tissue. The key task in photoacoustic imaging is to have acoustic signal that help to determine the size and location of the target object inside normal tissue. The analytical simulation used a spherical wave model representing target object (blood vessel or tumor) inside normal tissue. A computer program in MATLAB environment has been written to realize this simulation. This model generates time resolved acoustic wave signal that include both expansion and contraction parts of the wave. The photoacoustic signal from the target object is simulated for a range of laser pulse duration 1

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Direction Finding Using GHA Neural Networks
...Show More Authors

 This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).

 

 

View Publication Preview PDF