Staff Portal
Mustafa Maad Hamdi (Assistant Lecturer)

MSc in Communication and computer engineering
Lecturer
Computer Science - Computer Sciences and IT
mustafa.maad.hamdi@uoanbar.edu.iq

ScopusGoogle ScholarResearch GateORCIDPublonsFacebook


Biography

<p style="text-align:justify"><span style="font-size:14px"><span style="font-family:Calibri,sans-serif"><strong>Mustafa Maad Hamdi was born in Al-Anbar, Iraq. He received the&nbsp;B.Eng. degree in Computer Engineering Technology from Al-Maarif University College, Iraq. and the M.Sc. degree in Communication and Computer Engineering from University Kebangsaan Malaysia (UKM), Malaysia, and the&nbsp;Ph.D. degree in communication&nbsp;engineering from the University Tun Hussein Onn Malaysia&nbsp;(UTHM), Malaysia.&nbsp;He is currently a Lecturer in the computer science department,&nbsp;University of Anbar. His research interests include Wireless and Mobile Communications, VANET, MANET, data dissemination, and satellite Communication.</strong></span></span></p> <p style="text-align:justify">&nbsp;</p> <p style="text-align:justify">&nbsp;</p> <p style="text-align:justify">&nbsp;</p> <p style="text-align:justify">&nbsp;</p> <p style="text-align:justify">&nbsp;</p>

Publication

<p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="color:#2c3e50"><span style="font-size:16px">1.&nbsp;</span></span><span style="font-size:14px"><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:g5m5HwL7SMYC"><span style="color:#2c3e50">A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">2.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:M05iB0D1s5AC"><span style="color:#2c3e50">Detection of COVID-19 Using Classification of an X-Ray Image Using a Local Binary Pattern and K-Nearest Neighbors</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">3.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:ldfaerwXgEUC"><span style="color:#2c3e50">Study for Buildings with IoT System for Energy Management</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">4.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:70eg2SAEIzsC"><span style="color:#2c3e50">Hybrid security in AOMDV routing protocol with improved salp swarm algorithm in wireless sensor network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">5.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:35N4QoGY0k4C"><span style="color:#2c3e50">Performance Evaluation of Quality of Service (QoS) by using Hybrid Algorithms in VANETs</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">6.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:vV6vV6tmYwMC"><span style="color:#2c3e50">Effect Sybil attack on security Authentication Service in VANET</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">7.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:lSLTfruPkqcC"><span style="color:#2c3e50">WSN Application Based on Image Compression Using AHAAR Wavelet Transform</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">8.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:RYcK_YlVTxYC"><span style="color:#2c3e50">A review of Wireless Sensor Network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">9.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:J_g5lzvAfSwC"><span style="color:#2c3e50">A study review on Gray and Black Hole in Mobile Ad Hoc Networks (MANETs)</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">10.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:NaGl4SEjCO4C"><span style="color:#2c3e50">Channel Estimation using LS and MMSE Channel Estimation Techniques for MIMO-OFDM Systems</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">11.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:ns9cj8rnVeAC"><span style="color:#2c3e50">Intelligent Transportation Systems (ITSs) in VANET and MANET</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">12.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:O3NaXMp0MMsC"><span style="color:#2c3e50">Blockchain in fifth-generation network and beyond: a survey</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">13.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:2P1L_qKh6hAC"><span style="color:#2c3e50">Design and Fabrication of Alarming System Based on Laser and LDR</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">14.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:GnPB-g6toBAC"><span style="color:#2c3e50">A new approach for smart electric meter based on Zigbee</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">15.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:BqipwSGYUEgC"><span style="color:#2c3e50">Reliability-Aware Multi-Objective Optimization-Based Routing Protocol for VANETs Using Enhanced Gaussian Mutation Harmony Searching</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">16.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:YFjsv_pBGBYC"><span style="color:#2c3e50">Data dissemination in VANETs using clustering and probabilistic forwarding based on adaptive jumping multi-objective firefly optimization</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">17.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:NMxIlDl6LWMC"><span style="color:#2c3e50">Mobile 5G: Towards Technical View, Challenges and Issues</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">18.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:_Qo2XoVZTnwC"><span style="color:#2c3e50">Performance of Effect for XPM and FWM in Fiber Optics</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">19.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:e5wmG9Sq2KIC"><span style="color:#2c3e50">A Performance Evaluation of Voice over IP Protocols (SIP and H. 323) in Wireless Network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">20.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:R3hNpaxXUhUC"><span style="color:#2c3e50">Design and Simulation a Patch Antenna for Dual-Band Frequencies</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">21.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:k_IJM867U9cC"><span style="color:#2c3e50">Vehicular Networks Performance Evaluation Based on Downlink Scheduling Algorithms for High-Speed Long Term Evolution--Vehicle.</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">22.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:hMod-77fHWUC"><span style="color:#2c3e50">Study the effect of the Stimulated Raman Scattering (SRS) in optical fiber-based on OptiSystem</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">23.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:blknAaTinKkC"><span style="color:#2c3e50">Optimization of Energy-Efficient Cloud Radio Access Networks for 5G using Neural Networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">24.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:JV2RwH3_ST0C"><span style="color:#2c3e50">A hybrid Algorithms to Improve the Quality of Service in Vehicular Ad-Hoc Networks: A Framework</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">25.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:M3NEmzRMIkIC"><span style="color:#2c3e50">Develop Model for an Antenna with Dual Band Microstrip Patches</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">26.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:maZDTaKrznsC"><span style="color:#2c3e50">The low band in WiMAX with design H-Slot Microstrip Patch</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">27.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:TFP_iSt0sucC"><span style="color:#2c3e50">A review on various security attacks in vehicular ad hoc networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">28.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:mB3voiENLucC"><span style="color:#2c3e50">VANET-based traffic monitoring and incident detection system: A review.</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">29.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:iH-uZ7U-co4C"><span style="color:#2c3e50">The analysis of Teletraffic and Handover Performance in Cellular System</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">30.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:r0BpntZqJG4C"><span style="color:#2c3e50">Role and challenges of the use of UAV-aided WSN monitoring system in large-scale sectors</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">31.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:j3f4tGmQtD8C"><span style="color:#2c3e50">Advancement of deep learning in big data and distributed systems</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">32.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:4JMBOYKVnBMC"><span style="color:#2c3e50">An overview of challenges for data dissemination and routing protocols in VANETs</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">33.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:RHpTSmoSYBkC"><span style="color:#2c3e50">Integrity and Authentications for service security in vehicular ad hoc networks (VANETs): A Review</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">34.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:TQgYirikUcIC"><span style="color:#2c3e50">Transmission over OFDM and SC-FDMA for LTE systems</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">35.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:HDshCWvjkbEC"><span style="color:#2c3e50">Analysis and Simulation for Mobile Ad Hoc Network Using QualNet Simulator</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">36.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:hFOr9nPyWt4C"><span style="color:#2c3e50">Performance evaluation for vehicular ad-hoc networks based routing protocols</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">37.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:-f6ydRqryjwC"><span style="color:#2c3e50">Review on secure data aggregation in Wireless Sensor Networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">38.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:hC7cP41nSMkC"><span style="color:#2c3e50">A review on queue management algorithms in large networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">39.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:IWHjjKOFINEC"><span style="color:#2c3e50">E-Learning During Covid-19: Towards AlMaarif University College</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">40.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:bEWYMUwI8FkC"><span style="color:#2c3e50">Black/Gray Holes Detection Tools in MANET: comparison and analysis</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">41.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:L8Ckcad2t8MC"><span style="color:#2c3e50">Techniques of Early Incident Detection and Traffic Monitoring Centre in VANETs: A Review.</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">42.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:ULOm3_A8WrAC"><span style="color:#2c3e50">Reliable and efficient data dissemination scheme in VANET: a review</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">43.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:ZeXyd9-uunAC"><span style="color:#2c3e50">VANET: towards security issues review</span></a><span style="color:#2c3e50">.&nbsp;</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">44.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:qUcmZB5y_30C"><span style="color:#2c3e50">Performance Analysis of QoS in MANET based on IEEE 802.11 b</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">45.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:7PzlFSSx8tAC"><span style="color:#2c3e50">Combined Beamforming-Waveform Design using Mid-Band Frequencies for 5G and Beyond Networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">46.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:dhFuZR0502QC"><span style="color:#2c3e50">A review on UWB antenna sensor for wireless body area networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">47.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:QIV2ME_5wuYC"><span style="color:#2c3e50">A Survey on Multi-Objective Harmony Search-Based Clustering and Characteristics in WSN</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">48.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:9ZlFYXVOiuMC"><span style="color:#2c3e50">A Review of PAPR Reduction Techniques for UFMC Waveform</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">49.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:mVmsd5A6BfQC"><span style="color:#2c3e50">An overview on binary and non-binary codes and challenges in low parity-check-density</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">50.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:Wp0gIr-vW9MC"><span style="color:#2c3e50">An Overview of OFDM-UWB 60 GHZ System in High Order Modulation Schemes</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">51.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:4DMP91E08xMC"><span style="color:#2c3e50">Fuzzy Logic Controller to control the position of a mobile robot that follows a track on the floor</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">52.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:qxL8FJ1GzNcC"><span style="color:#2c3e50">Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets)</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">53.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:M3ejUd6NZC8C"><span style="color:#2c3e50">An optimum design of square microstrip patch antenna based on fuzzy logic rules</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">54.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:4TOpqqG69KYC"><span style="color:#2c3e50">A review of applications, characteristics and challenges in vehicular ad hoc networks (VANETs)</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">55.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:_kc_bZDykSQC"><span style="color:#2c3e50">Performance analyzing the effect of network size on routing protocols in MANETs</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">56.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:YOwf2qJgpHMC"><span style="color:#2c3e50">An overview on quality of service and data dissemination in VANETs</span></a><span style="color:#2c3e50">.&nbsp;</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">57.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:8k81kl-MbHgC"><span style="color:#2c3e50">A hybrid technique for single-source shortest path-based on A* algorithm and ant colony optimization</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">58.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:KlAtU1dfN6UC"><span style="color:#2c3e50">Coarse WDM in metropolitan networks: challenges, standards, applications, and future role</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">59.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:kNdYIx-mwKoC"><span style="color:#2c3e50">Green Communication Networks Challenges, Opportunities and Future Role.</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">60.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:3fE2CSJIrl8C"><span style="color:#2c3e50">Prediction based efficient multi-hop clustering approach with adaptive relay node selection for VANET.</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">61.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:aqlVkmm33-oC"><span style="color:#2c3e50">NE-CPPA: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (VANETs)</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">62.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:Zph67rFs4hoC"><span style="color:#2c3e50">A Survey on Data Dissemination and Routing Protocol in VANET: Types, Challenges, opportunistic and Future Role</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">63.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:_FxGoFyzp5QC"><span style="color:#2c3e50">A Study Review on Mobile Ad-Hoc Network: Characteristics, Applications, Challenges and Routing Protocols Classification</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">64.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:ufrVoPGSRksC"><span style="color:#2c3e50">Performance evaluation of active queue management algorithms in large network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">65.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:YsMSGLbcyi4C"><span style="color:#2c3e50">BER Vs Eb/N0 BPSK Modulation over Different Types of Channel</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">66.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:zYLM7Y9cAGgC"><span style="color:#2c3e50">Hybrid Tow Feature Extraction Descriptor for Shape Pattern Recognition</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">67.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:W7OEmFMy1HYC"><span style="color:#2c3e50">Monitoring the Cardiovascular Parameters (HR, RR, PBP) Under Pressure Situation</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">68.&nbsp;.</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=ar&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:ZHo1McVdvXMC"><span style="color:#2c3e50">Successful Delivery Using Stable Multi-Hop Clustering Protocol for Energy Efficient Highway VANET</span></a><span style="color:#2c3e50">s.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="color:#2c3e50"><span style="font-size:14px">69.&nbsp;</span></span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=ar&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:pqnbT2bcN3wC"><span style="color:#2c3e50"><span style="font-size:14px">Wireless Body Area Networks: Applications and Congestion Control Technologies</span></span></a></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=ar&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:pqnbT2bcN3wC"><span style="color:#2c3e50"><span style="font-size:14px">70.</span></span></a><span style="color:#2c3e50">&nbsp;Detection Systems for Distributed Denial-of-Service (DDoS) Attack Based on Time Series: A Review</span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=ar&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:pqnbT2bcN3wC"><span style="color:#2c3e50"><span style="font-size:14px">71.</span></span></a><span style="color:#2c3e50">&nbsp;Data Acquisition Board by Using Arduino to Measure Weather Temperature and Humidity.</span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=ar&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:pqnbT2bcN3wC"><span style="color:#2c3e50"><span style="font-size:14px">72.&nbsp;</span></span></a><span style="color:#2c3e50">The Hyperthermia Calculating in Head Blood by the Specific Absorption Rate (SAR) Influence in Novel Vision.</span></span></strong></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">73.&nbsp;Link stability based multipath routing and effective mobility prediction in cognitive radio enabled vehicular ad hoc network.</span></strong></span></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="color:#2c3e50">74.</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=ar&amp;user=IYo_Z-gAAAAJ&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:rO6llkc54NcC"><span style="color:#2c3e50">&nbsp;review of cryptocurrencies: Tether and ethereum&rlm;</span></a><span style="color:#2c3e50"> </span></span></strong></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">75. Resource Allocation and Edge Computing for Dual Hop Communication in Satellite Assisted UAVs enabled VANETs.</span></strong></span></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">76.&nbsp;Enhancing Data Dissemination Security and Quality Through the Authenticated Relay Selection and Scheduling Framework (ARSSF) in VANET.</span></strong></span></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">77.Transmission Power Reduction Based on an Enhanced Particle Swarm Optimization Algorithm in Wireless Sensor Network for Internet of Things</span></strong></span></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">&nbsp;</span></strong></span></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp;<u> </u></span><u><span style="font-size:16px">Book</span></u></span></strong></span></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">1.&nbsp;</span><a href="https://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=IYo_Z-gAAAAJ&amp;cstart=20&amp;pagesize=80&amp;sortby=pubdate&amp;citation_for_view=IYo_Z-gAAAAJ:UeHWp8X0CEIC"><span style="color:#2c3e50">Hybrid Tow Feature Extraction Descriptor For Shape Pattern Recognition</span></a><span style="color:#2c3e50">&nbsp;(</span></span><span style="color:#2c3e50">(ISBN:9786139584659)<span style="font-size:14px">.</span></span></span></strong></p> <p>&nbsp;</p> <p>&nbsp;</p>

Lectures


No Lectures Available .

Certificates

No Certificates Available

Suprvision

No Information Available .

Other

<p><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:22px"><strong><u>The papers that were reviewed:</u></strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">1.&nbsp;Improving Cotopaxi&rsquo;s Lahars Signal Analysis and Detection Time With a Real Time Processing ArrayImproving Cotopaxi&rsquo;s Lahars Signal Analysis and Detection Time With a Real Time Processing Array.&nbsp;<strong>(Cogent Engineering).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">2.&nbsp;Integration of Blockchain and Reinforcement Learning for Effectual Trust Evaluation in MANET-Disaster Scenarios.<strong> (Applied Artificial Intelligence).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">3.&nbsp;Hybrid Machine Learning Approach for Trust Evaluation to Secure MANET from Routing Attacks. <strong>(Applied Artificial Intelligence).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">4.&nbsp;Quality of Service Management for Fast Data Transmission in Industrial Mobile Communications using PSO based Computer Vision Technique. <strong>(Applied Artificial Intelligence)</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">5. Secure Communication and Malicious Node Detection Using Efficient Prevention Restricted Routing Protocol in MANET. <strong>(Applied Artificial Intelligence).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">6.&nbsp;Heuristic-Based Genetic Algorithm with Batesian Mimic Features for Secure Energy Efficient QoS Multicast Routing In Manet. <strong>(Cogent Engineering).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">7.&nbsp;EFFICIENT SECURITY FRAMEWORK AGAINST SYBIL ATTACK IN MOBILE ADHOC NETWORK USING EE-OLSR PROTOCOL SCHEME. <strong>(Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">8.&nbsp;Faco-cr: Dynamic Flying Ant Colony-based Congestion Control For Vehicular Ad Hoc Networks. <strong>(Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">9.&nbsp;Improved Ant Colony Algorithm for the Split Delivery Vehicle Routing Problem. <strong>(Scientific Programming).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">10.&nbsp;Self-healing Ais With Entropy Based Svm And Bayesian Aggregate Model For The Prediction And Isolation Of Malicious Nodes Triggering Dos Attacks In Vanet. <strong>(Journal of Interconnection Networks).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">11.&nbsp;Component based Effective Intrusion Detection System (CEIDS) for Seamless Data Communication in Vehicular Ad Hoc Network (VANET). <strong>(Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">12.&nbsp;A Secure Lightweight Authentication Model with Interference Aware Routing and Attack Detection Approach in VANET. (<strong>Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">13.&nbsp;3D Wireless Sensor Network Deployment Coverage Optimization Based on Multi-objective Sparrow Search Algorithm. <strong>(Ad Hoc Networks).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">14.&nbsp;Design and Enhancement of Microstrip Patch Antenna Utilizing Mushroom Like-EBG for 5G Communications. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">15.&nbsp;Delay-oriented Resource Allocation for OFDMA Real Time Mobile Broadband Services. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">16.&nbsp;Optimized Deep Neural Model based Intrusion Detection System for Vehicular Adhoc Network . (<strong>Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">17.&nbsp;Design of Efficient Energy Routing Protocol for Internet of Thing in Smart City. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">18.&nbsp;Blind Cfo Compensation for Next Gen Wlan Systems. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">19.&nbsp;Improving Mobility-aware Routing in Vehicular Ad Hoc Networks Considering Two Level Architecture. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">20.&nbsp;</span><a href="https://www.webofscience.com/wos/woscc/full-record/WOS:000925636700001"><span style="color:#000000">A transparent distributed ledger-based certificate revocation scheme for VANETs</span></a><span style="color:#000000">. <strong>(IEEE Access).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">21.&nbsp;A Directed Hypergraph Clustering Model (DiHGCM) in VANET - for Urban Scenario.<strong> (Computer Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">22.&nbsp;Improved Search Pattern with Discrete Wavelet Transform for Video Steganography and Computer Forensics Application.<strong> (International Conference on Emerging Technologies and Intelligent Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">23.&nbsp;Evaluation of free space optics uplink availability to LEO satellite using Climatic data in cairo.&nbsp;<strong>(Journal of Communications).</strong></span></span></p> <p><span style="color:#000000"><span style="font-size:14px">24. E</span></span>fficient Privacy Preserving Lightweight Cryptography for Multi-hop Clustering in Internet of Vehicles Network.<strong>(Wireless Personal Communications)</strong></p> <p>25. SCVAN- BKM: Swarm Clustering for Vehicular Ad-hoc Network with a Secure Blockchain-Based Key Management Scheme.<strong>(Peer-to-Peer Networking and Applications)&nbsp;</strong>&nbsp;&nbsp;</p> <p>&nbsp;26.Security in VANETs: Study and Analysis of Denial of Service (DOS) Attack and its Possible Solutions in VANETs Networks.&nbsp;<strong>(Security and Communication Networks)&nbsp;&nbsp;</strong></p> <p>&nbsp;</p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="font-size:18px">&nbsp;</span><span style="font-size:22px">&nbsp;&nbsp;</span></span></span><span style="font-size:22px"><u>Certificates</u></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; &nbsp;1. Certificate of Teaching Methods, University of Anbar.</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 2. Certificate of participation (a seminar to keep pace with the rapid development of technology).</span></span></li> </ul> <p style="margin-left:-12px; margin-right:-46px; text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; &nbsp; &nbsp;&nbsp;3. Workshop Certificate (the best ways must follow the methodology of the research impact factor).</span></span></p> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 4. Certificate of participation (the English Language reinforcement Course).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 5. Certificate of participation (occupational conduct in medical laboratories).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 6. Certificate of participation (standards National classification and international classification of public and private universities and colleges).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 7. Certificate of participation from (Middle Technical University <span dir="RTL">/</span> Electrical Engineering Technical / Department of Computer Engineering Techniques).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 8. Certificate of participation (course of Internal Auditor or Head of Auditors).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 9. Certificate of participation (Cyber Security).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 10. Two Certificates of participation from (National Center For Development &amp;Innovation).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 11. Certificate of (QMS for Accreditation of Laboratory Based on ISO 17025).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 12. Certificate of (Documentation of quality manual and procedures based on ISO 9001 &amp; ISO 10013).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 13. Certificate of (QMS ISO 9001:2015).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 14.Certificate of (Good Laboratory Practice (GLP) Based According to Criteria of OECD on Testing and Calibration).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px">&nbsp; 15.Certificate of Publons reviewer.</span></span></li> </ul> <p style="text-align:justify">&nbsp;</p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">&nbsp; </span></span><u><span style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:22px">Professional Membership</span></span></span></span></u></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">&nbsp; 1. Union of Iraqi Engineers.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">&nbsp; 2. ARID platform.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:14.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif">&nbsp; 3. IEEE Member</span></span></li> </ul> <p>&nbsp;</p> <p>&nbsp;</p> <p>&nbsp;</p>