Preferred Language
Articles
/
joe-2580
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and improving the routing protocol to support them makes it more suitable for IoT systems.
The proposed routing protocol is simulated using Castalia-3.2 and all the cases are examined to show the enhancement that achieved by each case. The proposed routing protocol shows better performance than other protocols do regarding Packet Delivery Ratio (PDR) and latency. It preserves network reliability since it does not generate routing or data packets needlessly. Routing protocol with added features (actuating and mobility) shows good performance. But that performance is affected by increasing the speed of mobile nodes.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
ZnO: MWCNT optical hybrid filter a promising nanomaterial for wastewater treatment and antimicrobial applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Feb 01 2025
Journal Name
Jornal Of Al-muthanna For Agricultural Sciences
A Proposed Approach to Agricultural Extension in Iraq for a Better Response to the Needs of farmer’s to Address Their Challenges
...Show More Authors

View Publication
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Improving the Recovery of Hydrocarbons in a Well in the Gullfaks Field by Injecting Sequestrated CO2
...Show More Authors

The Gullfaks field was discovered in 1978 in the Tampen area of the North Sea and it is one of the largest Norwegian oil fields located in Block 34/10 along the western flank of the Viking Graben in the northern North Sea. The Gullfaks field came on stream in 1986 and reached a peak of production in 2001. After some years, a decrease in production was noticed due to the decrease in pressure in the well. The goal of this paper is to improve the production of a well located in Gullfaks field by injecting CO2 through coiled tubing. The use of the CO2 injection method is due to the fact that it is a greenhouse gas, and its production in the atmosphere contributes to global warming. It is important to reduce its emission

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 02 2022
Journal Name
Turkish Journal Of Computer And Mathematics Education (turcomat)
Mpeg-Dash System via HTTP2 Protocol with HEVC Encoder for Video Streaming Services
...Show More Authors

MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besi

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 14 2016
Journal Name
Al-academy
proposed rules in the eastern musical theories.
...Show More Authors

This paper deals with one of important topics that serve the art movement music, which is looking at the stairs of Arab music in the process of reaching to the directory musical on the subject of so-called (Photo by stairs music) and that by comparing the method used previously and the proposed rules reached by the researcher and received the patent invention, the method is easier for the musician and the author in a directory of peace Arab music when used on grades and half grades voice, and to achieve its objectives researcher dealt with the problem that is determined by the multitude of stairs leading Arab and the difficulty of keeping its catalog of music, and for being an anchor and pillar of the music was taken up and put her impor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Proposed Method For Web Services Security
...Show More Authors

TI1e Web service securi ty challenge is to understand  and  assess the risk  involved  in securing  a web-based  service  today, based on our existing security technology, and at the same time tmck emerging standards and  understand  how they will be used  to offset the risk in

new web services. Any  security model must  i llustrate  how data  can

now  through   an  application   and   network   topology  to  meet  the

requirements  defined  by the busi ness  wi thout exposing  the data  to undue  risk.  In this paper  we propose &n

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Enhancing audit procedures in accordance with the international assurance standard through the implementation of a proposed program
...Show More Authors

Abstract:             

                  The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignme

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 01 2025
Journal Name
Iraqi Journal Of Agricultural Sciences
PURIFICATION OF PHYTASE PRODUCED FROM A LOCAL FUNGAL ISOLATE AND ITS APPLICATIONS IN FOOD SYSTEMS
...Show More Authors

View Publication