Preferred Language
Articles
/
ZBcLiZMBVTCNdQwCqNUO
Epidemiological Complex Networks: A Survey
...Show More Authors

     In this review paper, several research studies were surveyed to assist future researchers to identify available techniques in the field of infectious disease modeling across complex networks. Infectious disease modelling is becoming increasingly important because of the microbes and viruses that threaten people’s lives and societies in all respects. It has long been a focus of research in many domains, including mathematical biology, physics, computer science, engineering, economics, and the social sciences, to properly represent and analyze spreading processes. This survey first presents a brief overview of previous literature and some graphs and equations to clarify the modeling in complex networks, the detection of societies and their medical information, the identification of nodes, the method of communication with individuals and their spread, the analysis of their transmission through complex networks, and the detection of mathematical methods over the past century. Secondly, the types of epidemiological models and complex networks and the extent of their impact on humans are presented.

Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2017
Journal Name
Lecture Notes In Computer Science
The Art of Using Cross-Layer Design in Cognitive Radio Networks
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 12 2016
Journal Name
Wireless Networks
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
...Show More Authors

In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication

... Show More
View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (61)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks
...Show More Authors

Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Sep 12 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
The influence of fear on the dynamic of an eco-epidemiological system with predator subject to the weak Allee effect and harvesting
...Show More Authors

In this paper, an eco-epidemiological prey-predator system when the predator is subjected to the weak Allee effect, and harvesting was proposed and studied. The set of ordinary differential equations that simulate the system’s dynamic is constructed. The impact of fear and Allee’s effect on the system's dynamic behavior is one of our main objectives. The properties of the solution of the system were studied. All possible equilibrium points were determined, and their local, as well as global stabilities, were investigated. The possibility of the occurrence of local bifurcation was studied. Numerical simulation was used to further evaluate the global dynamics and understood the effects of varying parameters on the asymptotic behavior of t

... Show More
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Study the effect of a new nikel (II) Complex and anticancer drug (cp) on Liver enzyme activity (GPT,GOT) and Creatinine level in Kidney of femal mice
...Show More Authors

This study involved the effect of anew nickel (II) complexs with formla [NiL2(H2O)2].2.5ETOH where L=Bis[5-(p-nitrophenyL)-4-phenyL-1,2,4-traizole-3-dithocarbamato hydrazide] diaqua. nickel(II). Ethanol(2.5).and anti-cancer drug cyclophosphamide on specific actifity of two Liver enzymes (GOT,GPT) in the (Liver,kidney) tissues and on the creatinine Level in the kidney byUtilizing an invivosystem in femalmice.The result showed that inhibition in the activity of GPT and GOT enzymes in theLiver and in both nickel (II) complex and cyclophosphamide drug (CP) . mice weretreated with three doses (90,180,320) µg/mouse for three days for each group.The Liver show's the highest rate of GPT inhibition was about 97.43% at180µg/mouse regarding the ki

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Building a strategic perspective on the system of governance and measuring the level of its performance Survey study at the University of Basra
...Show More Authors

The Local and Global Corporations are suffering of managerial and financial corruption phenomena, which leads them to loss and bankruptcy. So, it is necessary to search for tools which help prevent phenomena like this, and one of these tools is (corporate governance) which represent controlling tool that contribute in reducing corruption. this study aims at modifying (corporate governance system)in order to make it suitable with Iraqi government Corporations. the study depend upon main hypothesis which is (the performance level of the strategic perspective of governance system is depending upon work according to the perspective dimensions itself.  From the main conclusions:-It is possible to building a strategic perspective

... Show More
View Publication Preview PDF
Crossref