Preferred Language
Articles
/
pxeKNY8BVTCNdQwCRmG1
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency. The bulk binding approaches were used to enhance the mobility signaling for MNs which are moving together from one MAG to another by exchanging a single bulk binding update message. However, in some cases there might be several MNs move at the same time but among different MAGs. In this paper, a bulk registration scheme based on the clustered sensor PMIPv6 architecture is proposed to reduce the mobility signaling cost by creating a single bulk message for all MNs attached to the cluster. Our mathematical results show that the proposed bulk scheme enhances the PMIPv6 performance by reducing the total handoff latency.</p>

Scopus Crossref
View Publication
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Characteristics studies of anti total PSA antibody's binding with prostate
...Show More Authors

the use of diffrent concectration of Na and Mg ions were shown to causes in increase in the bindings at oncentration

View Publication Preview PDF
Crossref
Publication Date
Wed Jul 09 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of thermocycling on microleakage analysis of bulk filled base composite in comparison to incrementally placed nanohybrid composite in class II MOD restorations (An in vitro study)
...Show More Authors

Background: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 16 2023
Journal Name
Wireless Personal Communications
Technology Applications in Tracking 2019-nCoV and Defeating Future Outbreaks: Iraqi Healthcare Industry in IoT Remote
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Analytical Chemistry
A Spectrophotometric Method for Tetracycline Determination in its Bulk Powder and Pharmaceutical Formulations Using Flow Injection and Batch Procedures: a Comparative Study
...Show More Authors

A reliable and environmental analytical method was developed for the direct determination of tetracycline using flow injection analysis (FIA) and batch procedures with spectrophotometric detection. The developed method is based on the reaction between a chromogenic reagent (vanadium (III) solution) and tetracycline at room temperature and in a neutral medium, resulting in the formation of an intense brown product that shows maximum absorption at 395 nm. The analytical conditions were improved by the application of experimental design. The proposed method was successfully used to analyze samples of commercial medications and verified throughout the concentration ranges of 25–250 and 3–25 µg/mL for both FIA and batch procedures, respecti

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Colloids And Surfaces A: Physicochemical And Engineering Aspects
Application of natural deep eutectic solvents in bulk liquid membrane system for removal of free glycerol from crude fatty acid methyl ester
...Show More Authors

Fatty Acid Methyl Ester (FAME) produced from biomass offers several advantages such as renewability and sustainability. The typical production process of FAME is accompanied by various impurities such as alcohol, soap, glycerol, and the spent catalyst. Therefore, the most challenging part of the FAME production is the purification process. In this work, a novel application of bulk liquid membrane (BLM) developed from conventional solvent extraction methods was investigated for the removal of glycerol from FAME. The extraction and stripping processes are combined into a single system, allowing for simultaneous solvent recovery whereby low-cost quaternary ammonium salt-glycerol-based deep eutectic solvent (DES) is used as the membrane phase.

... Show More
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
Hanbali's approach to building long and short travel provisions with issues attached to their provisions
...Show More Authors

 

The problem with research lies in hiding the Hanbali approach in building long and short travel provisions, as well as hiding some provisions relating to short travel that are not provided for by the jurists of Hanbali (in their books).

The research aims to demonstrate the approach and standards on which they based the long and short travel provisions, as well as to reflect the provisions of some of the issues that are silent on long and short travel, with evidence and significance.

The research included a preface and two researches, the researcher in the preface talked about the reality of long and short travel, in the first research on the approach of ha

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2009
Journal Name
Tencon 2009 - 2009 Ieee Region 10 Conference
The effect of using XCAST based routing protocol in wireless ad hoc networks
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Jan 26 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Secure Mobile Sink Node location in Wireless Sensor Network using Dynamic Routing Protocol
...Show More Authors

The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi

... Show More
Publication Date
Thu Jun 07 2012
Journal Name
Scientific Research And Essays
Security verification of the return routability protocol by Murphi
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref