Preferred Language
Articles
/
ZxbplocBVTCNdQwCUVd0
Efficient routing algorithm for VANETs based on distance factor
...Show More Authors

There has been a great deal of research into the considerable challenge of managing of traffic at road junctions; its application to vehicular ad hoc network (VANET) has proved to be of great interest in the developed world. Dynamic topology is one of the vital challenges facing VANET; as a result, routing of packets to their destination successfully and efficiently is a non-simplistic undertaking. This paper presents a MDORA, an efficient and uncomplicated algorithm enabling intelligent wireless vehicular communications. MDORA is a robust routing algorithm that facilitates reliable routing through communication between vehicles. As a position-based routing technique, the MDORA algorithm, vehicles' precise locations are used to establish the optimal route by which the vehicles may reach their desired destinations. By determining the route containing the maximum distance with the minimum number of hops, MDORA minimizes the control overhead. The final aspect of the paper is to compare gains of MDORA with those of existing protocols such as AODV, GPSR-L and HLAR in terms of throughput, packet delivery ratio and average delay. From the analysis, it will be evident that the performance of MDORA is far better than the other protocols.

Scopus Crossref
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Deep-Learning-Based Mobile Application for Detecting COVID-19
...Show More Authors

Patients infected with the COVID-19 virus develop severe pneumonia, which typically results in death. Radiological data show that the disease involves interstitial lung involvement, lung opacities, bilateral ground-glass opacities, and patchy opacities. This study aimed to improve COVID-19 diagnosis via radiological chest X-ray (CXR) image analysis, making a substantial contribution to the development of a mobile application that efficiently identifies COVID-19, saving medical professionals time and resources. It also allows for timely preventative interventions by using more than 18000 CXR lung images and the MobileNetV2 convolutional neural network (CNN) architecture. The MobileNetV2 deep-learning model performances were evaluated

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (10)
Crossref (7)
Scopus Crossref
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of Educational Program Based on the (Guttmann) Model for Developing Awareness and Emotional Experience among University Students
...Show More Authors

Abstract

The aim of the research is to identify the level of awareness and emotional experience among university students and to identify the effect of the educational program based on (Guttmann) model for developing awareness and emotional experience among university students by verifying the validity of the following zero hypotheses: 1) There are no statistically significant differences in the development of awareness and emotional experience among university students at the level of (0.05) between the mean scores of the experimental group in the pre and post-tests. 2) There are no statistically significant differences in the development of awareness and emotional experience among university students at the lev

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Applied Sciences
Multiobjective Optimization of Stereolithography for Dental Bridge Based on a Simple Shape Model Using Taguchi and Response Surface Methods
...Show More Authors

Stereolithography (SLA) has become an essential photocuring 3D printing process for producing parts of complex shapes from photosensitive resin exposed to UV light. The selection of the best printing parameters for good accuracy and surface quality can be further complicated by the geometric complexity of the models. This work introduces multiobjective optimization of SLA printing of 3D dental bridges based on simple CAD objects. The effect of the best combination of a low-cost resin 3D printer’s machine parameter settings, namely normal exposure time, bottom exposure time and bottom layers for less dimensional deviation and surface roughness, was studied. A multiobjective optimization method was utilized, combining the Taguchi me

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Analysis Based on Well Logging Data for Tight Carbonate Reservoir: The SADI Formation Case in Halfaya Oil Field
...Show More Authors

Carbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
The Numerical Technique Based on Shifted Jacobi-Gauss-Lobatto Polynomials for Solving Two Dimensional Multi-Space Fractional Bioheat Equations
...Show More Authors

This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref