Raaid Alubady PhD | University of Babylon (original) (raw)
Papers by Raaid Alubady PhD
Bulletin of Electrical Engineering and Informatics
Mobile ad-hoc networks (MANETs) have been a crucial element of next-generation wireless networkin... more Mobile ad-hoc networks (MANETs) have been a crucial element of next-generation wireless networking technologies during the last decade. Because they allow users to access information and communicate with each other without infrastructure. Selfishness is one of the numerous undesirable behaviors that MANET network nodes may exhibit since this selfish node attempts to safeguard its own resources while accessing the services of other nodes and consuming their resources. Hence, a potential that the network's overall performance may degrade. This study developed a new method named detection, reintroduced, and collaborative of selfish node (DRCSN) that proposed detecting selfish nodes based on two factors: energy and the communication ratio (CR) and handling the rate of selfish nodes. Thus, selfish nodes were exploited to the maximum degree and significantly improve network performance. DRCSN was implemented inside ad-hoc on-demand distance vector (AODV) protocol. The test scenarios w...
Perangkaian Data Dinamakan (NDN) adalah seni bina Internet memuncul yang menggunakan model rangka... more Perangkaian Data Dinamakan (NDN) adalah seni bina Internet memuncul yang menggunakan model rangkaian komunikasi baharu berdasarkan identiti kandungan Internet. Komponen utamanya iaitu Jadual Minat Tertunda (PIT) menyediakan peranan penting dalam merekodkan maklumat paket Minat yang sedia dihantar tetapi masih menunggu padanan paket Data. Dalam pengurusan PIT, isu pensaizan aliran PIT adalah sangat mencabar kerana penggunaan hayat Minat yang panjang secara meluas terutamanya apabila tiada dasar penggantian yang fleksibel sehingga mempengaruhi prestasi PIT. Matlamat penyelidikan ini adalah untuk mencadangkan satu pendekatan Pengurusan Kawalan PIT (PITCM) yang cekap untuk menangani paket Minat yang mendatang bagi mengurangkan limpahan PIT seterusnya meningkatkan penggunaan dan prestasi PIT. PITCM mengandungi mekanisme PIT Maya Mudah Suai (AVPIT), mekanisme Hayat Minat Ambang Pintar (STIL) dan Polisi Hayat Tertinggi Permintaan Terkecil (HLLR). AVPIT bertanggungjawab mendapatkan ramalan awal limpahan PIT berserta tindakan balasnya. STIL adalah untuk menyesuaikan nilai hayat paket Minat yang mendatang manakala HLLR digunakan untuk menguruskan kemasukan PIT secara cekap. Metodologi penyelidikan khusus diikuti untuk memastikan kerapian kerja bagi mencapai matlamat kajian ini. Perisian simulasi rangkaian digunakan dalam merekabentuk dan menilai PITCM. Keputusan kajian menunjukkan bahawa PITCM mengatasi prestasi PIT NDN piawai dengan 45% lebih tinggi kadar kepuasan Minat, 78% lebih rendah kadar penghantaran semula Minat dan 65% penurunan kadar keguguran Minat. Di samping itu, lengahan kepuasan Minat dan panjang PIT dikurangkan dengan ketara masing-masing kepada 33% dan 46%. Sumbangan kajian ini adalah penting dalam pengurusan paket Minat bagi sistem penghalaan dan penghantaran NDN. Mekanisme AVPIT dan STIL serta polisi HLLR boleh digunakan dalam memantau, mengawal dan menguruskan kandungan PIT untuk seni bina Internet masa hadapan.
Journal of Intelligent Systems and Internet of Things
Electronic health records are essential and sensitive since they include vital information and ar... more Electronic health records are essential and sensitive since they include vital information and are routinely exchanged across several parties, such as hospitals and private clinics. This data must remain accurate, current, secret, and available only to authorized parties. Integrating these data improves the accuracy and cost-effectiveness of the present health data administration framework. Electronic Medical Records (EMRs) are now kept utilizing the structure of the clientserver via whom patient data information is maintained in the hospital. Multiple hospitals use the same database to track a single patient. These limitations prevent a custom health system from providing various associated experts and patients with a cohesive, integrated, secure, and confidential medical history. Modern healthcare systems are distinguished by their complexity and expense. However, this may be mitigated by enhanced health record management and blockchain technology. The blockchain's data availa...
Journal of Intelligent Systems and Internet of Things
Currently, Machine Learning (ML) seems very attractive since it may speed up business functions i... more Currently, Machine Learning (ML) seems very attractive since it may speed up business functions in enterprises, lower costs for supplying goods and services, and manage information to promote enterprise efficiency. Essential technological domains nowadays are the explosive period of growth in enterprise solutions, which are progressively used in almost all business platforms. The ML sessions will receive a thorough summary, and the relevant organizations will be shown procedures for relevant business processes. The data management unit is already been striving to solve related issues in ML applications for more than a generation, creating numerous customized analytical techniques. The approach described in the study uses a weighted directed graph displayed in an industrial environment to identify the core part of the neural network structure and then trains them using the relevant data source. The article proposed ML-assisted Enterprise Data Management (ML-EDM) for identifying the t...
Advances in Intelligent Systems and Computing, 2019
Most of the services used by Internet consumers such as social network platforms, video-on-demand... more Most of the services used by Internet consumers such as social network platforms, video-on-demand, on-line gaming, web Media, and IP Television which are content-centric in nature; meaning they focus on named content objects instead of being focused on the host-location. In this context, many projects around named data propose redesigning and developing the communication of Internet-based on named data. NDN (Named Data Networking) is an ideal solution to achieve efficient data sharing and retrieval since NDN focuses on the contents themselves regardless of their sources. The focus of this survey is a unique characteristic presented by NDN; PIT (Pending Interest table). PIT is part of three fundamental data structures newly introduced in the NDN router to enable full functionality of NDN. NDN router depends on reverse paths in PIT to return back Data packets to consumers. Accordingly, the PIT may present stringent restrictions in terms of scalability, for-warding, and management. The challenging task is the design of a scalable and manageable PIT because it requires per-packet updating and controlling the impact of increasing Interest packets with the highest Interest lifetime of PIT. Therefore, this survey describes into greater detail the background and several important previous researches related to issues of PIT which is PIT management based on PIT placement, and replacement, PIT implementation as a data structure, and Adaptive Interest Life-time. Thus, would assist in defining the general framework of this survey.
Telecommunication Systems
2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT)
2021 1st Babylon International Conference on Information Technology and Science (BICITS)
In Mobile Ad-hoc Networks (MANETs), each node is free to move and connect with one another over a... more In Mobile Ad-hoc Networks (MANETs), each node is free to move and connect with one another over a wireless connection, without the requirement for a centralized controller or base station. These features make MANET useful and functional in a variety of areas, including tactical situations, sensor networks, rescue operations, and students on campus. However, this type of network also has a range of issues such as security, Quality of Service, dynamic topology, scalability, the absence of central management, and energy consumption. Since MANET nodes have little battery life, the power usage is among the most important design considerations in wireless ad-hoc networks. Each node is responsible for forwarding the packets to its neighboring nodes. Since the MANET does not contain a hierarchy, some nodes may not participate in forwarding the packets and prefer to keep their remaining energy for themselves; these nodes are called selfish nodes. The presence of selfish nodes in the MANET greatly affects the efficiency and activity of the network. The process of detecting and isolating the selfish node does not constitute an easy task. It still requires further investigation and study. Therefore, this survey is intended to determine, study and analyze some new detection mechanisms used in detecting selfish nodes in MANETs. It also classifies them into three categories which are credit-based, reputation-based, and acknowledgment-based techniques. In addition, it highlights some critical issues in MANET according to selfish behavior, and points out the necessary requirements for better improvement as well as fields for future research.
Enhancing or upgrading the existing algorithms needs big efforts to implement the existing one an... more Enhancing or upgrading the existing algorithms needs big efforts to implement the existing one and after to on the problem or the limitation in these algorithms. As such, we need to enhance or upgrade this algorithm or its step to be efficient. Many updating revised algorithms for string matching have been done in many areas. All the work relies on of how enhance the time matching to be efficient. This work introduces a good tool to enhance the existing Boyer-Moore algorithm. On the other hand, we have designed two new algorithms for string matching called RAM1 & RAM2 and developed the existing one called "enhance_BMA". The new algorithm depends on abstraction string method in Java's tool, which helps to find great results even in the worst case of matching. Finally, most of the Object-Oriented programming concepts have been achieved in this work. We propose in this paper new algorithm using Java tool which we called it RAM1 & RAM2. The existing Boyer-Moore has problems when the pattern length is long. This leads to increase the time complexity which causes unstably for this algorithm. On the other hand, we enhance the Boyer-Moore Algorithm (BMA) for a large given pattern in the text by using abstraction methods.
The Sixth International Conference on Internet Applications, Protocols and Services (NETAPPS2020), 2021
After successful research into the use of blockchain technology outside of financial matters, hea... more After successful research into the use of blockchain technology outside of financial matters, healthcare researchers have gained wide interest in using this technology for security purposes. Although research in this area is fairly recent, it is growing rapidly which leads to the introduction of many survey studies that deal with this context. However, more investigation is required in order to help and motivate researchers to propose new work in this field. In this study, the Blockchain-based healthcare is explored in detail, based on its models and architecture. two main aspects models of healthcare research that rely on blockchain technology, which include the Electronic Health Record (EHR) and Remote Patient Monitoring (RPM)) systems. This study aims to present a brief, critical report concerning systems and applications used to leverage blockchain technology with these two platforms. Furthermore, it provides a comprehensive comparison of these systems and techniques used in a concise manner. It then highlights the benefit of developing blockchain-based healthcare applications and its limitations, and underlines the necessary requirements for better improvement as well as the fields for future research.
International Journal on Communications Antenna and Propagation (IRECAP), 2021
Content-Centric Networking (CCN) is a novel modern architecture for the Internet in the future. T... more Content-Centric Networking (CCN) is a novel modern architecture for the Internet in the future. This architecture concentrates on content retrieval and dissemination solution for communication models. Forwarding strategies are decision-making strategies whose aim is to define the forwarding destination, i.e., where and when request packets will be redirected. They are considered as the most crucial component in a network environment because of their contribution to determining which strategy is suitable to adopt in accordance with the environment and the applications. These strategies have not been initially designed to support complex applications and interactions that require Interest packet send rate, CCN table sizing, refreshing Pending Interest Table (PIT), and Content Store (CS), such as disaster scenarios, social network, and smart applications. The goal of this work is to evaluate the performance of CCN forwarding strategies in disaster scenarios. A network simulator (i.e., ndnSIM) is utilized to measure the performance in many scenarios by modifying Interest packet rate, PIT size, and CS size. Evaluation results achieved after performing the study on the selected strategies are considerably enhanced for the metrics cache hit, PIT size, Interest retransmissions, number of hops, delay, and Interest delivery. The main significance of this work is that it formulates a universal rule as the main function, which can adopt a suitable forwarding strategy accurately in accordance with the PIT and CS conditions and Interest packet rate, thus leading to increased Interest packet satisfaction utilization without increasing Interest packet retransmission and response delay.
Journal of Physics: Conference Series, 2021
Recent years have witnessed a widespread interest in healthcare issues and the search for faster ... more Recent years have witnessed a widespread interest in healthcare issues and the search for faster and safer service for patients. Electronic health record was established to provide advanced health services. Researchers seek to provide permanent and simplified ways to monitor patients remotely using remote patient monitors. One of these methods is the use of Internet of Things (IoT) devices, where the healthcare provider can monitor the patient remotely. However, with the current centralized electronic patient record system and increase in number of IoT devices, security and privacy issues have arisen, as some patients may not want to disclose their data, in addition to particular concerns or risks that affect the patient's life. To reduce these issues, several studies have presented the use of blockchain technology as a trustworthy network of solutions to ensure patient information security and secure the transfer of IoT devices' data. In this regard, this research is an attempt to present a new framework that facilitates the storage and transfer of patient data in the blockchain by merging the electronic health record and remote patient monitoring techniques into a single framework using Django. This framework allows the transfer of data from IoT devices to multiple peers, making use of the smart contract provided by the Ethereum platform.
Journal of Network and Computer Applications, 2018
Named Data Networking (NDN) is an emerging Internet architecture that employs a new network commu... more Named Data Networking (NDN) is an emerging Internet architecture that employs a new network communication model based on the identity of Internet content. Its core component, the Pending Interest Table (PIT) serves a significant role of recording Interest packet information which is ready to be sent but in waiting for matching Data packet. In managing PIT, the issue of flow PIT sizing has been very challenging due to massive use of long Interest lifetime particularly when there is no flexible replacement policy, hence affecting PIT performance. The aim of this study is to propose an efficient PIT Control Management (PITCM) approach to be used in handling incoming Interest packets in order to mitigate PIT overflow thus enhancing PIT utilization and performance. PITCM consists of Adaptive Virtual PIT (AVPIT) mechanism, Smart Threshold Interest Lifetime (STIL) mechanism and Highest Lifetime Least Request (HLLR) policy. The AVPIT is responsible for obtaining early PIT overflow prediction and reaction. STIL is meant for adjusting lifetime value for incoming Interest packet while HLLR is utilized for managing PIT entries in efficient manner. A specific research methodology is followed to ensure that the work is rigorous in achieving the aim of the study. The network simulation tool is used to design and evaluate PITCM. The results of study show that PITCM outperforms the performance of standard NDN PIT with 45% higher Interest satisfaction rate, 78% less Interest retransmission rate and 65% less Interest drop rate. In addition, Interest satisfaction delay and PIT length is reduced significantly to 33% and 46%, respectively. The contribution of this study is important for Interest packet management in NDN routing and forwarding systems. The AVPIT and STIL mechanisms as well as the HLLR policy can be used in monitoring, controlling and managing the PIT contents for Internet architecture of the future.
International Journal of Electrical and Computer Engineering (IJECE), 2020
Rule-based classification in the field of health care using artificial intelligence provides solu... more Rule-based classification in the field of health care using artificial intelligence provides solutions in decision-making problems involving different domains. An important challenge is providing access to good and fast health facilities. Cervical cancer is one of the most frequent causes of death in females. The diagnostic methods for cervical cancer used in health centers are costly and time-consuming. In this paper, bat algorithm for feature selection and ant colony optimization-based classification algorithm was applied on cervical cancer data set obtained from the repository of the University of California, Irvine to analyze the disease based on optimal features. The proposed algorithm outperforms other methods in terms of comprehensibility and obtains better results in terms of classification accuracy.
Karbala International Journal of Modern Science, 2020
The main objective of routing protocol is to select the next-hop connection node for packets trav... more The main objective of routing protocol is to select the next-hop connection node for packets traveling from source to distention. Greedy algorithm depends on the distance only to select the next-hop connection and it is building one chain only. Delay is considering the main drawback in all chain based routing protocols in the wireless sensor network. Direct Line Routing Protocol (DLRP) is a proposed protocol in this scientific research and it has three phases which are intraconnection, interconnection and chain head selection. DLRP connects all sensor nodes in the same line (column) in one chain then selects one node as the chain head (CH) to connecting directly with the base station (BS). CHs in DLRP have lower responsibility for data delivery than other protocols that make energy saving and avoid data redundancy. Network simulator 3 (ns-3) is used to evaluate the performance of DLRP including all phases with close routing protocols DCBRP and CCM since they are for deterministic node deployment and in the same experimental environment. The results show the superiority of DLRP based on related performance metrics which average end-to-end delay, power consumption, CHs power consumption, and delay* energy metrics. Furthermore, DLRP can adopt to another deployment method to increase the stability and prolong the lifetime of the Network.
Springer, Singapore, 2020
There is lack of complete congestion control solution that is optimized or practical with the Nam... more There is lack of complete congestion control solution that is optimized or practical with the Named Data Networking (NDN)-based MANET environment. All the existing suggested solutions are either for general NDN which is not optimized for MANET environment or congestion control solution for incomplete NON-based MANET. Therefore, we recommend a complete congestion control solution specifically for NON-based MANET which we call Standbyme Congestion Control or simply called Standbyme. Standbyme design optimized for NON-based MANET needs in reducing network congestion's bad effect such as goodput reduction, increment of number of packet loss or increment of delay in NON-based MANET. Through the testbed experiment, we did by comparing Standbyme F. Muchtar (181)
Advances in Intelligent Systems and Computing-Springer, Cham, 2020
Indonesian Journal of Electrical Engineering and Computer Science, 2020
Communication by email is counted as a popular manner through which users can exchange informatio... more Communication by email is counted as a popular manner through which users can exchange information. The email could be abused by spammers to spread suspicious content to the Internet users. Thus, the need to an effective way to detect spam emails are becoming clear to keep this information safe from malicious access. Many methods have been developed to address such a problem. In this paper, a machine learning technique is applied to detect spam emails. In this technique, a detection system based on sequential minimal optimization (SMO) is built to classify emails into two categories: spam and non-spam (ham). Each email is represented by a set of features extracted from its textual content. A hybrid feature selection is developed to choose a subset of these features based on their importance in process of the detection. This subset is then input into the SMO algorithm to make the detection decision. The use of such a technique provides an efficient protective mechanism to control spams. The experimental results show that the performance of the proposed method is promising compared with the existing methods. 1. INTRODUCTION The range of services that can be accessed via Internet grow rapidly on daily basis. This requires providing a certain level of security against the malicious behaviour which is gradually becoming a real threat. With the fast progress in technology and applications, the need to provide tools to face the threat is becoming clear. The security issues such as worms and viruses have been regarded the main challenges by Information Technology world. Additionally, spams in the form of emails creates another dimension of threat. These spams have inappropriate content and are received by unknown senders. Receiving such emails at high rate on daily basis annoy the user. In addition, the computational resources are consumed causing degradation in the value of email service. The problem of spam email detection is described in the following. Given a set of emails partitioned to two sets (classes): ham and spam, where each email has a label, e.g. +1 for spam and 1 for ham. The goal to address such a problem is to build a detector (classifier) such that for any unseen received email, a label (also called target class) is given to that email. A variety of approaches has been proposed to address the problem of spam email detection. The performance of most popular approaches will be briefly reviewed and critically assessed for solving the problem in hand. Clustering techniques have been applied for the problem in which the unsupervised learning were adopted [1-5]. Starting from an unlabeled dataset, the instances of the set are grouped (clustered) into two clusters: spam and non-spam. A similarity measure is applied to identify the instances in each group. In [2, 4], k-nearest neighbours (kNN) approach has been adopted. This approach produce no classification model and the classification is carried out by determining the similarity between the testing
AIP Conference Proceedings , 2019
Mobile Ad-hoc Network (MANET) is a special type of wireless network with self-organizing, buildin... more Mobile Ad-hoc Network (MANET) is a special type of wireless network with self-organizing, building shared routing information, dynamic network connectivity without any dependence on fixed infrastructures for wireless communication. However, the dynamics and the unpredictable behavior of wireless Mobile Ad-hoc Networks (MANET) results in hindrance are providing sufficient reliability to the network connection. Frequent route changes in the network relatively introduce incessant link failure, which eventually degrades Transmission Control Protocol (TCP) performance considerably. In another hand, a traditional TCP cannot be detected route failure losses and link contention losses that occur in MANET. Thus, considers every packet loss as congestion, which as a result is a severe degradation of TCP performance. Therefore, we are about addressing the potential enhancement of the performance of TCP when …
Bulletin of Electrical Engineering and Informatics
Mobile ad-hoc networks (MANETs) have been a crucial element of next-generation wireless networkin... more Mobile ad-hoc networks (MANETs) have been a crucial element of next-generation wireless networking technologies during the last decade. Because they allow users to access information and communicate with each other without infrastructure. Selfishness is one of the numerous undesirable behaviors that MANET network nodes may exhibit since this selfish node attempts to safeguard its own resources while accessing the services of other nodes and consuming their resources. Hence, a potential that the network's overall performance may degrade. This study developed a new method named detection, reintroduced, and collaborative of selfish node (DRCSN) that proposed detecting selfish nodes based on two factors: energy and the communication ratio (CR) and handling the rate of selfish nodes. Thus, selfish nodes were exploited to the maximum degree and significantly improve network performance. DRCSN was implemented inside ad-hoc on-demand distance vector (AODV) protocol. The test scenarios w...
Perangkaian Data Dinamakan (NDN) adalah seni bina Internet memuncul yang menggunakan model rangka... more Perangkaian Data Dinamakan (NDN) adalah seni bina Internet memuncul yang menggunakan model rangkaian komunikasi baharu berdasarkan identiti kandungan Internet. Komponen utamanya iaitu Jadual Minat Tertunda (PIT) menyediakan peranan penting dalam merekodkan maklumat paket Minat yang sedia dihantar tetapi masih menunggu padanan paket Data. Dalam pengurusan PIT, isu pensaizan aliran PIT adalah sangat mencabar kerana penggunaan hayat Minat yang panjang secara meluas terutamanya apabila tiada dasar penggantian yang fleksibel sehingga mempengaruhi prestasi PIT. Matlamat penyelidikan ini adalah untuk mencadangkan satu pendekatan Pengurusan Kawalan PIT (PITCM) yang cekap untuk menangani paket Minat yang mendatang bagi mengurangkan limpahan PIT seterusnya meningkatkan penggunaan dan prestasi PIT. PITCM mengandungi mekanisme PIT Maya Mudah Suai (AVPIT), mekanisme Hayat Minat Ambang Pintar (STIL) dan Polisi Hayat Tertinggi Permintaan Terkecil (HLLR). AVPIT bertanggungjawab mendapatkan ramalan awal limpahan PIT berserta tindakan balasnya. STIL adalah untuk menyesuaikan nilai hayat paket Minat yang mendatang manakala HLLR digunakan untuk menguruskan kemasukan PIT secara cekap. Metodologi penyelidikan khusus diikuti untuk memastikan kerapian kerja bagi mencapai matlamat kajian ini. Perisian simulasi rangkaian digunakan dalam merekabentuk dan menilai PITCM. Keputusan kajian menunjukkan bahawa PITCM mengatasi prestasi PIT NDN piawai dengan 45% lebih tinggi kadar kepuasan Minat, 78% lebih rendah kadar penghantaran semula Minat dan 65% penurunan kadar keguguran Minat. Di samping itu, lengahan kepuasan Minat dan panjang PIT dikurangkan dengan ketara masing-masing kepada 33% dan 46%. Sumbangan kajian ini adalah penting dalam pengurusan paket Minat bagi sistem penghalaan dan penghantaran NDN. Mekanisme AVPIT dan STIL serta polisi HLLR boleh digunakan dalam memantau, mengawal dan menguruskan kandungan PIT untuk seni bina Internet masa hadapan.
Journal of Intelligent Systems and Internet of Things
Electronic health records are essential and sensitive since they include vital information and ar... more Electronic health records are essential and sensitive since they include vital information and are routinely exchanged across several parties, such as hospitals and private clinics. This data must remain accurate, current, secret, and available only to authorized parties. Integrating these data improves the accuracy and cost-effectiveness of the present health data administration framework. Electronic Medical Records (EMRs) are now kept utilizing the structure of the clientserver via whom patient data information is maintained in the hospital. Multiple hospitals use the same database to track a single patient. These limitations prevent a custom health system from providing various associated experts and patients with a cohesive, integrated, secure, and confidential medical history. Modern healthcare systems are distinguished by their complexity and expense. However, this may be mitigated by enhanced health record management and blockchain technology. The blockchain's data availa...
Journal of Intelligent Systems and Internet of Things
Currently, Machine Learning (ML) seems very attractive since it may speed up business functions i... more Currently, Machine Learning (ML) seems very attractive since it may speed up business functions in enterprises, lower costs for supplying goods and services, and manage information to promote enterprise efficiency. Essential technological domains nowadays are the explosive period of growth in enterprise solutions, which are progressively used in almost all business platforms. The ML sessions will receive a thorough summary, and the relevant organizations will be shown procedures for relevant business processes. The data management unit is already been striving to solve related issues in ML applications for more than a generation, creating numerous customized analytical techniques. The approach described in the study uses a weighted directed graph displayed in an industrial environment to identify the core part of the neural network structure and then trains them using the relevant data source. The article proposed ML-assisted Enterprise Data Management (ML-EDM) for identifying the t...
Advances in Intelligent Systems and Computing, 2019
Most of the services used by Internet consumers such as social network platforms, video-on-demand... more Most of the services used by Internet consumers such as social network platforms, video-on-demand, on-line gaming, web Media, and IP Television which are content-centric in nature; meaning they focus on named content objects instead of being focused on the host-location. In this context, many projects around named data propose redesigning and developing the communication of Internet-based on named data. NDN (Named Data Networking) is an ideal solution to achieve efficient data sharing and retrieval since NDN focuses on the contents themselves regardless of their sources. The focus of this survey is a unique characteristic presented by NDN; PIT (Pending Interest table). PIT is part of three fundamental data structures newly introduced in the NDN router to enable full functionality of NDN. NDN router depends on reverse paths in PIT to return back Data packets to consumers. Accordingly, the PIT may present stringent restrictions in terms of scalability, for-warding, and management. The challenging task is the design of a scalable and manageable PIT because it requires per-packet updating and controlling the impact of increasing Interest packets with the highest Interest lifetime of PIT. Therefore, this survey describes into greater detail the background and several important previous researches related to issues of PIT which is PIT management based on PIT placement, and replacement, PIT implementation as a data structure, and Adaptive Interest Life-time. Thus, would assist in defining the general framework of this survey.
Telecommunication Systems
2022 Fifth College of Science International Conference of Recent Trends in Information Technology (CSCTIT)
2021 1st Babylon International Conference on Information Technology and Science (BICITS)
In Mobile Ad-hoc Networks (MANETs), each node is free to move and connect with one another over a... more In Mobile Ad-hoc Networks (MANETs), each node is free to move and connect with one another over a wireless connection, without the requirement for a centralized controller or base station. These features make MANET useful and functional in a variety of areas, including tactical situations, sensor networks, rescue operations, and students on campus. However, this type of network also has a range of issues such as security, Quality of Service, dynamic topology, scalability, the absence of central management, and energy consumption. Since MANET nodes have little battery life, the power usage is among the most important design considerations in wireless ad-hoc networks. Each node is responsible for forwarding the packets to its neighboring nodes. Since the MANET does not contain a hierarchy, some nodes may not participate in forwarding the packets and prefer to keep their remaining energy for themselves; these nodes are called selfish nodes. The presence of selfish nodes in the MANET greatly affects the efficiency and activity of the network. The process of detecting and isolating the selfish node does not constitute an easy task. It still requires further investigation and study. Therefore, this survey is intended to determine, study and analyze some new detection mechanisms used in detecting selfish nodes in MANETs. It also classifies them into three categories which are credit-based, reputation-based, and acknowledgment-based techniques. In addition, it highlights some critical issues in MANET according to selfish behavior, and points out the necessary requirements for better improvement as well as fields for future research.
Enhancing or upgrading the existing algorithms needs big efforts to implement the existing one an... more Enhancing or upgrading the existing algorithms needs big efforts to implement the existing one and after to on the problem or the limitation in these algorithms. As such, we need to enhance or upgrade this algorithm or its step to be efficient. Many updating revised algorithms for string matching have been done in many areas. All the work relies on of how enhance the time matching to be efficient. This work introduces a good tool to enhance the existing Boyer-Moore algorithm. On the other hand, we have designed two new algorithms for string matching called RAM1 & RAM2 and developed the existing one called "enhance_BMA". The new algorithm depends on abstraction string method in Java's tool, which helps to find great results even in the worst case of matching. Finally, most of the Object-Oriented programming concepts have been achieved in this work. We propose in this paper new algorithm using Java tool which we called it RAM1 & RAM2. The existing Boyer-Moore has problems when the pattern length is long. This leads to increase the time complexity which causes unstably for this algorithm. On the other hand, we enhance the Boyer-Moore Algorithm (BMA) for a large given pattern in the text by using abstraction methods.
The Sixth International Conference on Internet Applications, Protocols and Services (NETAPPS2020), 2021
After successful research into the use of blockchain technology outside of financial matters, hea... more After successful research into the use of blockchain technology outside of financial matters, healthcare researchers have gained wide interest in using this technology for security purposes. Although research in this area is fairly recent, it is growing rapidly which leads to the introduction of many survey studies that deal with this context. However, more investigation is required in order to help and motivate researchers to propose new work in this field. In this study, the Blockchain-based healthcare is explored in detail, based on its models and architecture. two main aspects models of healthcare research that rely on blockchain technology, which include the Electronic Health Record (EHR) and Remote Patient Monitoring (RPM)) systems. This study aims to present a brief, critical report concerning systems and applications used to leverage blockchain technology with these two platforms. Furthermore, it provides a comprehensive comparison of these systems and techniques used in a concise manner. It then highlights the benefit of developing blockchain-based healthcare applications and its limitations, and underlines the necessary requirements for better improvement as well as the fields for future research.
International Journal on Communications Antenna and Propagation (IRECAP), 2021
Content-Centric Networking (CCN) is a novel modern architecture for the Internet in the future. T... more Content-Centric Networking (CCN) is a novel modern architecture for the Internet in the future. This architecture concentrates on content retrieval and dissemination solution for communication models. Forwarding strategies are decision-making strategies whose aim is to define the forwarding destination, i.e., where and when request packets will be redirected. They are considered as the most crucial component in a network environment because of their contribution to determining which strategy is suitable to adopt in accordance with the environment and the applications. These strategies have not been initially designed to support complex applications and interactions that require Interest packet send rate, CCN table sizing, refreshing Pending Interest Table (PIT), and Content Store (CS), such as disaster scenarios, social network, and smart applications. The goal of this work is to evaluate the performance of CCN forwarding strategies in disaster scenarios. A network simulator (i.e., ndnSIM) is utilized to measure the performance in many scenarios by modifying Interest packet rate, PIT size, and CS size. Evaluation results achieved after performing the study on the selected strategies are considerably enhanced for the metrics cache hit, PIT size, Interest retransmissions, number of hops, delay, and Interest delivery. The main significance of this work is that it formulates a universal rule as the main function, which can adopt a suitable forwarding strategy accurately in accordance with the PIT and CS conditions and Interest packet rate, thus leading to increased Interest packet satisfaction utilization without increasing Interest packet retransmission and response delay.
Journal of Physics: Conference Series, 2021
Recent years have witnessed a widespread interest in healthcare issues and the search for faster ... more Recent years have witnessed a widespread interest in healthcare issues and the search for faster and safer service for patients. Electronic health record was established to provide advanced health services. Researchers seek to provide permanent and simplified ways to monitor patients remotely using remote patient monitors. One of these methods is the use of Internet of Things (IoT) devices, where the healthcare provider can monitor the patient remotely. However, with the current centralized electronic patient record system and increase in number of IoT devices, security and privacy issues have arisen, as some patients may not want to disclose their data, in addition to particular concerns or risks that affect the patient's life. To reduce these issues, several studies have presented the use of blockchain technology as a trustworthy network of solutions to ensure patient information security and secure the transfer of IoT devices' data. In this regard, this research is an attempt to present a new framework that facilitates the storage and transfer of patient data in the blockchain by merging the electronic health record and remote patient monitoring techniques into a single framework using Django. This framework allows the transfer of data from IoT devices to multiple peers, making use of the smart contract provided by the Ethereum platform.
Journal of Network and Computer Applications, 2018
Named Data Networking (NDN) is an emerging Internet architecture that employs a new network commu... more Named Data Networking (NDN) is an emerging Internet architecture that employs a new network communication model based on the identity of Internet content. Its core component, the Pending Interest Table (PIT) serves a significant role of recording Interest packet information which is ready to be sent but in waiting for matching Data packet. In managing PIT, the issue of flow PIT sizing has been very challenging due to massive use of long Interest lifetime particularly when there is no flexible replacement policy, hence affecting PIT performance. The aim of this study is to propose an efficient PIT Control Management (PITCM) approach to be used in handling incoming Interest packets in order to mitigate PIT overflow thus enhancing PIT utilization and performance. PITCM consists of Adaptive Virtual PIT (AVPIT) mechanism, Smart Threshold Interest Lifetime (STIL) mechanism and Highest Lifetime Least Request (HLLR) policy. The AVPIT is responsible for obtaining early PIT overflow prediction and reaction. STIL is meant for adjusting lifetime value for incoming Interest packet while HLLR is utilized for managing PIT entries in efficient manner. A specific research methodology is followed to ensure that the work is rigorous in achieving the aim of the study. The network simulation tool is used to design and evaluate PITCM. The results of study show that PITCM outperforms the performance of standard NDN PIT with 45% higher Interest satisfaction rate, 78% less Interest retransmission rate and 65% less Interest drop rate. In addition, Interest satisfaction delay and PIT length is reduced significantly to 33% and 46%, respectively. The contribution of this study is important for Interest packet management in NDN routing and forwarding systems. The AVPIT and STIL mechanisms as well as the HLLR policy can be used in monitoring, controlling and managing the PIT contents for Internet architecture of the future.
International Journal of Electrical and Computer Engineering (IJECE), 2020
Rule-based classification in the field of health care using artificial intelligence provides solu... more Rule-based classification in the field of health care using artificial intelligence provides solutions in decision-making problems involving different domains. An important challenge is providing access to good and fast health facilities. Cervical cancer is one of the most frequent causes of death in females. The diagnostic methods for cervical cancer used in health centers are costly and time-consuming. In this paper, bat algorithm for feature selection and ant colony optimization-based classification algorithm was applied on cervical cancer data set obtained from the repository of the University of California, Irvine to analyze the disease based on optimal features. The proposed algorithm outperforms other methods in terms of comprehensibility and obtains better results in terms of classification accuracy.
Karbala International Journal of Modern Science, 2020
The main objective of routing protocol is to select the next-hop connection node for packets trav... more The main objective of routing protocol is to select the next-hop connection node for packets traveling from source to distention. Greedy algorithm depends on the distance only to select the next-hop connection and it is building one chain only. Delay is considering the main drawback in all chain based routing protocols in the wireless sensor network. Direct Line Routing Protocol (DLRP) is a proposed protocol in this scientific research and it has three phases which are intraconnection, interconnection and chain head selection. DLRP connects all sensor nodes in the same line (column) in one chain then selects one node as the chain head (CH) to connecting directly with the base station (BS). CHs in DLRP have lower responsibility for data delivery than other protocols that make energy saving and avoid data redundancy. Network simulator 3 (ns-3) is used to evaluate the performance of DLRP including all phases with close routing protocols DCBRP and CCM since they are for deterministic node deployment and in the same experimental environment. The results show the superiority of DLRP based on related performance metrics which average end-to-end delay, power consumption, CHs power consumption, and delay* energy metrics. Furthermore, DLRP can adopt to another deployment method to increase the stability and prolong the lifetime of the Network.
Springer, Singapore, 2020
There is lack of complete congestion control solution that is optimized or practical with the Nam... more There is lack of complete congestion control solution that is optimized or practical with the Named Data Networking (NDN)-based MANET environment. All the existing suggested solutions are either for general NDN which is not optimized for MANET environment or congestion control solution for incomplete NON-based MANET. Therefore, we recommend a complete congestion control solution specifically for NON-based MANET which we call Standbyme Congestion Control or simply called Standbyme. Standbyme design optimized for NON-based MANET needs in reducing network congestion's bad effect such as goodput reduction, increment of number of packet loss or increment of delay in NON-based MANET. Through the testbed experiment, we did by comparing Standbyme F. Muchtar (181)
Advances in Intelligent Systems and Computing-Springer, Cham, 2020
Indonesian Journal of Electrical Engineering and Computer Science, 2020
Communication by email is counted as a popular manner through which users can exchange informatio... more Communication by email is counted as a popular manner through which users can exchange information. The email could be abused by spammers to spread suspicious content to the Internet users. Thus, the need to an effective way to detect spam emails are becoming clear to keep this information safe from malicious access. Many methods have been developed to address such a problem. In this paper, a machine learning technique is applied to detect spam emails. In this technique, a detection system based on sequential minimal optimization (SMO) is built to classify emails into two categories: spam and non-spam (ham). Each email is represented by a set of features extracted from its textual content. A hybrid feature selection is developed to choose a subset of these features based on their importance in process of the detection. This subset is then input into the SMO algorithm to make the detection decision. The use of such a technique provides an efficient protective mechanism to control spams. The experimental results show that the performance of the proposed method is promising compared with the existing methods. 1. INTRODUCTION The range of services that can be accessed via Internet grow rapidly on daily basis. This requires providing a certain level of security against the malicious behaviour which is gradually becoming a real threat. With the fast progress in technology and applications, the need to provide tools to face the threat is becoming clear. The security issues such as worms and viruses have been regarded the main challenges by Information Technology world. Additionally, spams in the form of emails creates another dimension of threat. These spams have inappropriate content and are received by unknown senders. Receiving such emails at high rate on daily basis annoy the user. In addition, the computational resources are consumed causing degradation in the value of email service. The problem of spam email detection is described in the following. Given a set of emails partitioned to two sets (classes): ham and spam, where each email has a label, e.g. +1 for spam and 1 for ham. The goal to address such a problem is to build a detector (classifier) such that for any unseen received email, a label (also called target class) is given to that email. A variety of approaches has been proposed to address the problem of spam email detection. The performance of most popular approaches will be briefly reviewed and critically assessed for solving the problem in hand. Clustering techniques have been applied for the problem in which the unsupervised learning were adopted [1-5]. Starting from an unlabeled dataset, the instances of the set are grouped (clustered) into two clusters: spam and non-spam. A similarity measure is applied to identify the instances in each group. In [2, 4], k-nearest neighbours (kNN) approach has been adopted. This approach produce no classification model and the classification is carried out by determining the similarity between the testing
AIP Conference Proceedings , 2019
Mobile Ad-hoc Network (MANET) is a special type of wireless network with self-organizing, buildin... more Mobile Ad-hoc Network (MANET) is a special type of wireless network with self-organizing, building shared routing information, dynamic network connectivity without any dependence on fixed infrastructures for wireless communication. However, the dynamics and the unpredictable behavior of wireless Mobile Ad-hoc Networks (MANET) results in hindrance are providing sufficient reliability to the network connection. Frequent route changes in the network relatively introduce incessant link failure, which eventually degrades Transmission Control Protocol (TCP) performance considerably. In another hand, a traditional TCP cannot be detected route failure losses and link contention losses that occur in MANET. Thus, considers every packet loss as congestion, which as a result is a severe degradation of TCP performance. Therefore, we are about addressing the potential enhancement of the performance of TCP when …
— Pending Interest Table (PIT) in Named Data Networking (NDN) architecture is complex in the forw... more — Pending Interest Table (PIT) in Named Data Networking (NDN) architecture is complex in the forwarding operation in both upload of Interest packets and download of Data packets. PIT is considered useful for so many reasons in the centric-networking. These among other operations include: reducing bandwidth usage, communicating with no prior knowledge of publishers and subscribers, loop and packet loss detection and best security. However, despite the numerous advantages of PIT, hardware challenges, including PIT are still crucial in respect to NDN management for better memory efficiency. Due to the high access frequency to the PIT, it is essential to understand its functionality, and the effect it has on PIT performance, especially since PIT overflows. In our quest for designing a replacement policy as close to optimal as possible, we proposed a new replacement policy in PIT. This paper presents a new replacement policy named Highest Lifetime Least Request (HLLR). HLLR is designed to replace entries in the PIT which has the minimum number of incoming faces with maximum Lifetime. We have tested the policy using ndnSIM simulator and evaluated the results with some existing PIT replacement policies, i.e. Persistent (default), Least Recently Used (LRU) and Random. HLLR policy, design and evaluation are presented in this paper, aimed at obtaining better performance in case delay time, minimum Interest retransmission and Interest drop. The significance of this study is thus, it presents a conceptual model in order to tackle the issue of Interest replaces delay, which will be very much useful for managing the PIT when it is full.
Many researches have been done in the field of mobile networking, specifically in the field of ad... more Many researches have been done in the field of mobile networking, specifically in the field of ad-hoc networks. The major aim of these networks is the delivery of data to a given node at the destination, irrespective of its location. Mobile Ad-hoc Network (MANET) employs the traditional TCP/IP structure to provide end-to-end communication between nodes (we named this type of architecture is IP-MANET). However, due to their mobility and the limited resource in wireless networks, each layer in the TCP/IP model requires redefinition or modifications to function efficiently in MANET. Named Data MANET (ND-MANET) architecture is a recently emerging research area. The in-network chunk-based caching feature of NDN is beneficial in coping with the mobility and intermittent connectivity challenges in MANETs. In the natural disaster field, MANET is considered a challenging task because of the unpredictable changes in the network topology due to the absence of any centralized control. The goals of this paper have two ways: first, this study provides a performance comparison of IP-MANET to ND-MANET in terms of throughput, delay, and packet loss. While the second contribution is to identify which architecture has an impact on the natural disaster (i.e., Flooding disaster) in rural areas and suggests which one may perform better. For experimental purposes, our analyses IP-MANET and ND-MANET by extensive simulations in the NS 3 simulator under a number of different network scenarios, and show that how number of nodes and variety packets size affect their performance.
Information Centric Networking (ICN) a future Internet, presents a new paradigm by shifting the c... more Information Centric Networking (ICN) a future Internet, presents a new paradigm by shifting the current network to the modern network protocols. Its goal, to improve the traditional network operations by enabling ICN packet routing and forwarding based on names. This shift will bring advantages, but at the same time, it is leading to a big challenge on routing approaches to implement ICN nodes. Routing approaches must use special techniques to publish messages to all the network nodes. Flooding approach stateless, and an easy is however, results in control overhead, depending the network size. on Moreover, designing, implementing, and evaluating routing approaches with higher capacity is really a key challenge in the overall ICN research area, because the state of ICN brings a significant cost; both in packet processing and router storage. Many approaches were proposed in the literatures over these years for the efficient control of forwarding on the network. This paper provides a classification and review of the routing mechanisms that are proposed on six ICN architectures. A summary in tabular form and a comparative study of these six architectures is also given in the paper as well as few open research challenges are highlighted.
boiling Four Generation (4G) networks are the far the can support since it airwaves over the conn... more boiling Four Generation (4G) networks are the far the can support since it airwaves over the connection geographic distance over the world, especially are to the popularity of the wireless devices. The Long-Term Evolution (LTE) is often called the 4G. Nowadays, telecommunications, video traffic has burgeoned under the development of LTE, the truly underlying access technology of 4G networks. During LTE deployment, different transport protocols are the most recommended and widely studied such as Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Datagram Congestion Control Protocol (DCCP), which can perform differently on 4G networks depends on the network's scenario as well as parameters setting. Although the LTE deployment is rapidly apace, there is a lack of performance evaluation of its protocols. Therefore, an extensive analysis is needed to evaluate the performance of various protocols for high end applications like multimedia applications. Supporting these multimedia applications with varied quality of service (QoS) requirements while maximizing the resource utilization is a challenging task. To achieve the objective of this study, this work tries to answer the following questions: are the old protocol suit with this new technology; which one has the best performance and; which one has the greatest effect on throughput, delay, packet loss and packet delivery ratio. In this study, our analysis and compare are on the performance of different the Internet transport protocols for streaming video via using simulation environment. Through the Network Simulation 3 (NS3), the performance of transporting an MPEG4 video stream, including throughput, delay, packet delivery ratio and packet loss are analyzed at the base station through TCP, UDP, and DCCP protocols over 4G-LTE technology. The results show that DCCP has a better throughput, and a lesser delay, but at the same time it has more packet losses than UDP and TCP. Based on the results, DCCP is recommended as a transport protocol for real-time video.