Preferred Language
Articles
/
joe-2580
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and improving the routing protocol to support them makes it more suitable for IoT systems.
The proposed routing protocol is simulated using Castalia-3.2 and all the cases are examined to show the enhancement that achieved by each case. The proposed routing protocol shows better performance than other protocols do regarding Packet Delivery Ratio (PDR) and latency. It preserves network reliability since it does not generate routing or data packets needlessly. Routing protocol with added features (actuating and mobility) shows good performance. But that performance is affected by increasing the speed of mobile nodes.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Sustainable Roadway Planning: A Model for a Proposed Rating System in Iraq
...Show More Authors

     The goal of the research is to develop a sustainable rating system for roadway projects in Iraq for all of the life cycle stages of the projects which are (planning, design, construction and operation and maintenance). This paper investigates the criteria and its weightings of the suggested roadway rating system depending on sustainable planning activities. The methodology started in suggesting a group of sustainable criteria for planning stage and then suggesting weights from (1-5) points for each one of it. After that data were collected by using a closed questionnaire directed to the roadway experts group in order to verify the criteria weightings based on the relative importance of the roadway related impacts

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 28 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Flying Ad hoc Networks (FANET): Performance Evaluation of Topology Based Routing Protocols
...Show More Authors

Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct

... Show More
View Publication Preview PDF
Crossref (21)
Crossref
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Dynamic Routing Method over Hybrid SDN for Flying Ad Hoc Networks
...Show More Authors

Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
A proposed Mathematical Expression for Computer Design of Electrostatic Mirror
...Show More Authors

A computational investigation has been carried out on the design and properties of the electrostatic mirror. In this research, we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The electron beam path under zero magnification condition had been investigated as mirror trajectory with the aid of fourth – order – Runge – Kutta method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system has suffer from the chromatic aberration, for this case, it is use to operate the mirror in optical system at various values

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Ieee Internet Of Things Journal
A New Task Allocation Protocol for Extending Stability and Operational Periods in Internet of Things
...Show More Authors

Scopus (17)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Ieee Systems Journal
A Comprehensive Survey of the Current Trends and Extensions for the Proxy Mobile IPv6 Protocol
...Show More Authors

View Publication
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Lecture Notes In Electrical Engineering
Handling Mobility with Network Virtualization in IoT WAVE Context
...Show More Authors

Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Improving Shear Strength of Soft Clay by Using Torn Belts Chips
...Show More Authors

Random throwing of industrial waste has a significant impact on the environment unless it takes into account the conditions of engineered destroying and/or re-used. Taking the advantage of re-using waste materials in engineering projects represents a well-planned project in order to resolve a lot of engineering problems for some difficult soils. The objective of this study was to evaluate the capability and effects of Rubber Shreds (RS) from scrap torn belts towards improving the shear strength of soft clay. A direct shear tests were conducted on soft clay-RS mixture. The following parameters were investigated to study the influence of RS content, water content, normal stress, and dilation ratio. From experimental test results it was fou

... Show More
View Publication Preview PDF