Preferred Language
Articles
/
joe-2268
Performance Study of AODV, GRP and OSPFv3 MANET Routing Protocols Using OPNET Modeler
...Show More Authors

A Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study was done using OPNET Modeler v14.5 and the comparison between the protocols was done in terms of throughput, routing traffic received, traffic sent, load and delay with increased number of mobile nodes from 10, 25 and 50 mobile nodes. The results showed that AODV (reactive routing protocol) was better in delay and had smaller load and smaller throughput than GRP (reactive and proactive routing protocols) and OSPFv3 (proactive routing protocols).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
Arab World English Journal
An Assessment of Iraqi EFL Learners’ Performance in Using Synonymy and Antonymy
...Show More Authors

The knowledge related with lexical items can be realized as including relations of meaning a cross words. Words that share a similarity of meaning are called to be synonymous, and words that share a contrary of meaning are called to be antonymous. Both of them are universal linguistic phenomenon that exist in terms of linguistic system of every language. The present study aims at finding out areas of difficulty that Iraqi EFL learners encounter in the use of synonymy and antonymy, both on the recognition and production levels. Also tries to detect the main reasons behind such difficulties. A diagnostic test of two parts, namely, recognition and production, is designed. The test is built to include two linguistic phenomenon which are: synony

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Aug 13 2025
Journal Name
Mechanics Of Time-dependent Materials
Performance evaluation of highly modified asphalt binders using elastomeric and plastomeric polymers
...Show More Authors

Highly Modified Asphalt (HiMA) binders have garnered significant attention due to their superior resistance to rutting, fatigue cracking, and thermal distress under heavy traffic loads and extreme environmental conditions. While elastomeric polymers such as Styrene- Butadiene-Styrene (SBS) have been extensively used in HiMA applications, the potential of plastomeric polymers, including Polyethylene (PE) and Ethylene Vinyl Acetate (EVA), remains largely unexplored. This study aims to evaluate the performance of reference binder (RB) modified with plastomeric HiMA asphalt in comparison to SBS-modified binders and determine the optimal polymer dosage for achieving an optimal balance between rutting resistance and fatigue durability. The experi

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jun 16 2017
Journal Name
Computers
Enhancing BER Performance Limit of BCH and RS Codes Using Multipath Diversity
...Show More Authors

View Publication
Scopus (13)
Crossref (9)
Scopus Crossref
Publication Date
Sat Mar 02 2019
Journal Name
Biochem. Cell.arch.
EVALUATION OF PRIMARY IMPLANTS STABILITY IN IMMEDIATE AND DELAYED TREATMENT PROTOCOLS ACCORDING TO BONE DENSITY, JAWS, GENDER AND AGE UTILIZING PERIOTEST M DEVICE
...Show More Authors

Publication Date
Sun Jul 01 2012
Journal Name
Applied Soft Computing
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks
...Show More Authors

Scopus (246)
Crossref (202)
Scopus Clarivate Crossref
Publication Date
Sat Sep 27 2014
Journal Name
Soft Computing
Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks
...Show More Authors

View Publication
Scopus (30)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Ieee Transactions On Intelligent Transportation Systems
Real-Time Intersection-Based Segment Aware Routing Algorithm for Urban Vehicular Networks
...Show More Authors

High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination

... Show More
View Publication
Scopus (69)
Crossref (62)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Performance evaluation of vocational and administrative institutions in the media using the bench-marking of new media: analytical study in the Journal of time
...Show More Authors

Provides the style of benchmarking the best possible use whenevaluating the performance and evaluation, as well as improved performance,due to its consistency with the principles of good evaluation of theperformance, an extension of the completion of several functions of the timeand cost less, thereby increasing the efficiency of the management of theinstitutions, especially institutions, the media, as it became public the future ofthe message sender to the same time Zaorosaúl new media is challenging thetraditional media of what distinguishes this new interactive media and mass ledto this transition . However, the media Aljdidhoosaúl traditional mediacontinue to coexist and reinforce each Menhmaalakhr, for his wealth offreedom of opin

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Modeling and Simulation of Solar Module performance using Five Parameters Model by using Matlab in Baghdad City
...Show More Authors

This work presents the modeling of the electrical response of monocrystalline photovoltaic module by using five parameters model based on manufacture data-sheet of a solar module that measured in stander test conditions (STC) at radiation 1000W/m² and cell temperature 25 . The model takes into account the series and parallel (shunt) resistance of the module. This paper considers the details of Matlab modeling of the solar module by a developed Simulink model using the basic equations, the first approach was to estimate the parameters: photocurrent Iph, saturation current Is, shunt resistance Rsh, series resistance Rs, ideality factor A at stander test condition (STC) by an ite

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Oct 03 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced TEA Algorithm Performance using Affine Transformation and Chaotic Arnold Map
...Show More Authors

In digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th

... Show More
View Publication Preview PDF
Crossref