Preferred Language
Articles
/
joe-1998
A Comparative Study of Single-Constraint Routing in Wireless Mesh Networks Using Different Dynamic Programming Algorithms
...Show More Authors

Finding the shortest route in wireless mesh networks is an important aspect. Many techniques are used to solve this problem like dynamic programming, evolutionary algorithms, weighted-sum techniques, and others. In this paper, we use dynamic programming techniques to find the shortest path in wireless mesh networks due to their generality, reduction of complexity and facilitation of numerical computation, simplicity in incorporating constraints, and their onformity to the stochastic nature of some problems. The routing problem is a multi-objective optimization problem with some constraints such as path capacity and end-to-end delay. Single-constraint routing problems and solutions using Dijkstra, Bellman-Ford, and Floyd-Warshall algorithms are proposed in this work with a discussion on the difference between them. These algorithms find the shortest route through finding the optimal rate between two nodes in the wireless networks but with bounded end-to-end delay. The Dijkstra-based algorithm is especially favorable in terms of processing time. We also present a comparison between our proposed single-constraint Dijkstra-based routing algorithm and the mesh routing algorithm (MRA) existing in the literature to clarify the merits of the former.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 30 2014
Journal Name
Iraqi Journal Of Science
The Prevalence of Autoimmune Thyroiditis in A sample of Infertile Iraqi Women
...Show More Authors

In the present study, the aim was made to identify the relationship between thyroid autoimmunity (TAI) and female infertility. The study was performed on 30 infertile women and 22 age-matched healthy fertile control age (33 ± 5 years). Overall, serum prolactin (PRL), thyroid stimulating hormone (TSH) assay is the key test for the diagnosis and management of hypo and hyperthyroidism. Anti-TPO Ab and anti-TG Ab were measured. The mean ± SE of serum PRL (31.080 ± 3.06) ng/ml was significantly (P<0.05) higher in infertile group compared with control (16.191±1.36) ng/ml. Serum TSH was significantly (P<0.05) higher in infertile group (5.689 ± 1.12) µIU/ml compared to control group (2.282 ± 0.18) µIU/ml. The prevalence of positive

... Show More
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Biomechanics
In vitro wear testing of a contemporary design of reverse shoulder prosthesis
...Show More Authors

Reverse shoulder arthroplasty is an increasingly common surgical intervention. However there are concerns and known limitations in relation to such joint replacement, while novel designs of reverse shoulder prostheses continue to appear on the market. Many claim to offer improvements over older designs but such assertions are difficult to validate when there is no consensus as to how such implants should be tested in vitro or even if such testing is necessary. In order to permit appropriate in vitro testing of reverse shoulder prostheses a unique, multi-station test rig was designed which was capable of applying motion in three axes to test prostheses. The shoulder simulator can apply up to 110° of motion in the flexion–extension and abd

... Show More
View Publication
Scopus (29)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Sat Jan 09 2016
Journal Name
مجلة العلوم التربوية والنفسية
Hill, the Employment of a Specimen in the Teaching of Arabic Grammar
...Show More Authors

The construction process of reception containing rebuild educated new gloss within the context of real-time knowledge with previous experience and learning environment, accounting for all of the real experiences and information beside Education backbones structural climate (olive 0.2002: p. 212 .) Based on two basic principles - : I: - The natural science that we do know from our experiences, we can not say for sure Bhakaigah realism and clearly, but built by creative minds of certain interpretations be applicable in light of our expectations. Other: - The knowledge built effectively active learner who adapts new knowledge with the conceptual framework has, since everyone has a conceptual framework can break at any time and replaced by a ne

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of The College Of Languages (jcl)
Nature of a holy book in the poetry of Ibn Arabi Mohi
...Show More Authors

The paper discusses the lack of a uniform definition of politeness due to the constant tension between its universality and language specificity, and argues that some of the theoretical debate could be resolved if the distinction between politeness as a commonsense notion and politeness as a theoretical construct were clearly addressed and acknowledged in the research.

View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A survey of deepfakes in terms of deep learning and multimedia forensics
...Show More Authors

Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Alustath Journal For Human And Social Sciences
A Cognitive Stylistic Analysis of Characterization in Golding’s Lord of the Flies
...Show More Authors

Characterization is commonly known in stylistics to be the cognitive process in the readers' minds when comprehending a fictional character in a literary work .In one approach, it is assumed that characters are the outcome of the interaction between the words in the text on the one hand and the contents of our heads on the other. This paper is an attempt to understand how characterization is achieved by applying Culpeper’s (2001) model which seems to be to present a method of analysis that is more objective and more systematic in analyzing characters. Two characters are selected for discussion; Ralph and Jack from Golding’s (1954) Lord of the Flies. The novel talks about the corruption of human beings and the capacity of evil th

... Show More
View Publication
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Ieee Transactions On Neural Systems And Rehabilitation Engineering
Transradial Amputee Gesture Classification Using an Optimal Number of sEMG Sensors: An Approach Using ICA Clustering
...Show More Authors

View Publication
Scopus (145)
Crossref (145)
Scopus Clarivate Crossref
Publication Date
Thu Nov 12 2020
Journal Name
Journal Of Petroleum Research And Studies
Production Optimization for Natural Flow and ESP Well A Case Study on Well NS-5 Mishrif Formation-Nasriya Oil Field
...Show More Authors

As the reservoir conditions are in continuous changing during its life, well production rateand its performance will change and it needs to re-model according to the current situationsand to keep the production rate as high as possible.Well productivity is affected by changing in reservoir pressure, water cut, tubing size andwellhead pressure. For electrical submersible pump (ESP), it will also affected by numberof stages and operating frequency.In general, the production rate increases when reservoir pressure increases and/or water cutdecreases. Also the flow rate increase when tubing size increases and/or wellhead pressuredecreases. For ESP well, production rate increases when number of stages is increasedand/or pump frequency is

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
The International Journal Of Oral &amp; Maxillofacial Implants
Early Failure Rate and Associated Risk Factors for Dental Implants Placed With and Without Maxillary Sinus Augmentation: A Retrospective Study
...Show More Authors

View Publication
Scopus (25)
Crossref (20)
Scopus Clarivate Crossref