Mustafa Maad Hamdi (Assistant Lecturer)
MSc in Communication and computer engineering
Lecturer
Computer Science -
Computer Sciences and IT
mustafa.maad.hamdi@uoanbar.edu.iq
<p style="text-align:justify"><span style="font-size:14px"><span style="font-family:Calibri,sans-serif"><strong>Mustafa Maad Hamdi was born in Al-Anbar, Iraq. He received the B.Eng. degree in Computer Engineering Technology from Al-Maarif University College, Iraq. and the M.Sc. degree in Communication and Computer Engineering from University Kebangsaan Malaysia (UKM), Malaysia, and the Ph.D. degree in communication engineering from the University Tun Hussein Onn Malaysia (UTHM), Malaysia. He is currently a Lecturer in the computer science department, University of Anbar. His research interests include Wireless and Mobile Communications, VANET, MANET, data dissemination, and satellite Communication.</strong></span></span></p> <p style="text-align:justify"> </p> <p style="text-align:justify"> </p> <p style="text-align:justify"> </p> <p style="text-align:justify"> </p> <p style="text-align:justify"> </p>
<p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="color:#2c3e50"><span style="font-size:16px">1. </span></span><span style="font-size:14px"><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:g5m5HwL7SMYC"><span style="color:#2c3e50">A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">2. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:M05iB0D1s5AC"><span style="color:#2c3e50">Detection of COVID-19 Using Classification of an X-Ray Image Using a Local Binary Pattern and K-Nearest Neighbors</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">3. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:ldfaerwXgEUC"><span style="color:#2c3e50">Study for Buildings with IoT System for Energy Management</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">4. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:70eg2SAEIzsC"><span style="color:#2c3e50">Hybrid security in AOMDV routing protocol with improved salp swarm algorithm in wireless sensor network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">5. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:35N4QoGY0k4C"><span style="color:#2c3e50">Performance Evaluation of Quality of Service (QoS) by using Hybrid Algorithms in VANETs</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">6. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:vV6vV6tmYwMC"><span style="color:#2c3e50">Effect Sybil attack on security Authentication Service in VANET</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">7. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:lSLTfruPkqcC"><span style="color:#2c3e50">WSN Application Based on Image Compression Using AHAAR Wavelet Transform</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">8. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:RYcK_YlVTxYC"><span style="color:#2c3e50">A review of Wireless Sensor Network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">9. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:J_g5lzvAfSwC"><span style="color:#2c3e50">A study review on Gray and Black Hole in Mobile Ad Hoc Networks (MANETs)</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">10. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:NaGl4SEjCO4C"><span style="color:#2c3e50">Channel Estimation using LS and MMSE Channel Estimation Techniques for MIMO-OFDM Systems</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">11. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:ns9cj8rnVeAC"><span style="color:#2c3e50">Intelligent Transportation Systems (ITSs) in VANET and MANET</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">12. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:O3NaXMp0MMsC"><span style="color:#2c3e50">Blockchain in fifth-generation network and beyond: a survey</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">13. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:2P1L_qKh6hAC"><span style="color:#2c3e50">Design and Fabrication of Alarming System Based on Laser and LDR</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">14. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:GnPB-g6toBAC"><span style="color:#2c3e50">A new approach for smart electric meter based on Zigbee</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">15. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:BqipwSGYUEgC"><span style="color:#2c3e50">Reliability-Aware Multi-Objective Optimization-Based Routing Protocol for VANETs Using Enhanced Gaussian Mutation Harmony Searching</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">16. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:YFjsv_pBGBYC"><span style="color:#2c3e50">Data dissemination in VANETs using clustering and probabilistic forwarding based on adaptive jumping multi-objective firefly optimization</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">17. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:NMxIlDl6LWMC"><span style="color:#2c3e50">Mobile 5G: Towards Technical View, Challenges and Issues</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">18. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:_Qo2XoVZTnwC"><span style="color:#2c3e50">Performance of Effect for XPM and FWM in Fiber Optics</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">19. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:e5wmG9Sq2KIC"><span style="color:#2c3e50">A Performance Evaluation of Voice over IP Protocols (SIP and H. 323) in Wireless Network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">20. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:R3hNpaxXUhUC"><span style="color:#2c3e50">Design and Simulation a Patch Antenna for Dual-Band Frequencies</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">21. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:k_IJM867U9cC"><span style="color:#2c3e50">Vehicular Networks Performance Evaluation Based on Downlink Scheduling Algorithms for High-Speed Long Term Evolution--Vehicle.</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">22. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:hMod-77fHWUC"><span style="color:#2c3e50">Study the effect of the Stimulated Raman Scattering (SRS) in optical fiber-based on OptiSystem</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">23. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:blknAaTinKkC"><span style="color:#2c3e50">Optimization of Energy-Efficient Cloud Radio Access Networks for 5G using Neural Networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">24. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:JV2RwH3_ST0C"><span style="color:#2c3e50">A hybrid Algorithms to Improve the Quality of Service in Vehicular Ad-Hoc Networks: A Framework</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">25. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:M3NEmzRMIkIC"><span style="color:#2c3e50">Develop Model for an Antenna with Dual Band Microstrip Patches</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">26. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:maZDTaKrznsC"><span style="color:#2c3e50">The low band in WiMAX with design H-Slot Microstrip Patch</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">27. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:TFP_iSt0sucC"><span style="color:#2c3e50">A review on various security attacks in vehicular ad hoc networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">28. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:mB3voiENLucC"><span style="color:#2c3e50">VANET-based traffic monitoring and incident detection system: A review.</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">29. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:iH-uZ7U-co4C"><span style="color:#2c3e50">The analysis of Teletraffic and Handover Performance in Cellular System</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">30. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:r0BpntZqJG4C"><span style="color:#2c3e50">Role and challenges of the use of UAV-aided WSN monitoring system in large-scale sectors</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">31. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:j3f4tGmQtD8C"><span style="color:#2c3e50">Advancement of deep learning in big data and distributed systems</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">32. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:4JMBOYKVnBMC"><span style="color:#2c3e50">An overview of challenges for data dissemination and routing protocols in VANETs</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">33. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:RHpTSmoSYBkC"><span style="color:#2c3e50">Integrity and Authentications for service security in vehicular ad hoc networks (VANETs): A Review</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">34. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:TQgYirikUcIC"><span style="color:#2c3e50">Transmission over OFDM and SC-FDMA for LTE systems</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">35. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:HDshCWvjkbEC"><span style="color:#2c3e50">Analysis and Simulation for Mobile Ad Hoc Network Using QualNet Simulator</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">36. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:hFOr9nPyWt4C"><span style="color:#2c3e50">Performance evaluation for vehicular ad-hoc networks based routing protocols</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">37. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:-f6ydRqryjwC"><span style="color:#2c3e50">Review on secure data aggregation in Wireless Sensor Networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">38. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:hC7cP41nSMkC"><span style="color:#2c3e50">A review on queue management algorithms in large networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">39. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:IWHjjKOFINEC"><span style="color:#2c3e50">E-Learning During Covid-19: Towards AlMaarif University College</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">40. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:bEWYMUwI8FkC"><span style="color:#2c3e50">Black/Gray Holes Detection Tools in MANET: comparison and analysis</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">41. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:L8Ckcad2t8MC"><span style="color:#2c3e50">Techniques of Early Incident Detection and Traffic Monitoring Centre in VANETs: A Review.</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">42. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:ULOm3_A8WrAC"><span style="color:#2c3e50">Reliable and efficient data dissemination scheme in VANET: a review</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">43. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:ZeXyd9-uunAC"><span style="color:#2c3e50">VANET: towards security issues review</span></a><span style="color:#2c3e50">. </span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">44. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:qUcmZB5y_30C"><span style="color:#2c3e50">Performance Analysis of QoS in MANET based on IEEE 802.11 b</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">45. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:7PzlFSSx8tAC"><span style="color:#2c3e50">Combined Beamforming-Waveform Design using Mid-Band Frequencies for 5G and Beyond Networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">46. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:dhFuZR0502QC"><span style="color:#2c3e50">A review on UWB antenna sensor for wireless body area networks</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">47. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:QIV2ME_5wuYC"><span style="color:#2c3e50">A Survey on Multi-Objective Harmony Search-Based Clustering and Characteristics in WSN</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">48. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:9ZlFYXVOiuMC"><span style="color:#2c3e50">A Review of PAPR Reduction Techniques for UFMC Waveform</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">49. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:mVmsd5A6BfQC"><span style="color:#2c3e50">An overview on binary and non-binary codes and challenges in low parity-check-density</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">50. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:Wp0gIr-vW9MC"><span style="color:#2c3e50">An Overview of OFDM-UWB 60 GHZ System in High Order Modulation Schemes</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">51. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:4DMP91E08xMC"><span style="color:#2c3e50">Fuzzy Logic Controller to control the position of a mobile robot that follows a track on the floor</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">52. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:qxL8FJ1GzNcC"><span style="color:#2c3e50">Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets)</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">53. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:M3ejUd6NZC8C"><span style="color:#2c3e50">An optimum design of square microstrip patch antenna based on fuzzy logic rules</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">54. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:4TOpqqG69KYC"><span style="color:#2c3e50">A review of applications, characteristics and challenges in vehicular ad hoc networks (VANETs)</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">55. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:_kc_bZDykSQC"><span style="color:#2c3e50">Performance analyzing the effect of network size on routing protocols in MANETs</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">56. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:YOwf2qJgpHMC"><span style="color:#2c3e50">An overview on quality of service and data dissemination in VANETs</span></a><span style="color:#2c3e50">. </span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">57. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:8k81kl-MbHgC"><span style="color:#2c3e50">A hybrid technique for single-source shortest path-based on A* algorithm and ant colony optimization</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">58. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:KlAtU1dfN6UC"><span style="color:#2c3e50">Coarse WDM in metropolitan networks: challenges, standards, applications, and future role</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">59. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:kNdYIx-mwKoC"><span style="color:#2c3e50">Green Communication Networks Challenges, Opportunities and Future Role.</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">60. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:3fE2CSJIrl8C"><span style="color:#2c3e50">Prediction based efficient multi-hop clustering approach with adaptive relay node selection for VANET.</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">61. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:aqlVkmm33-oC"><span style="color:#2c3e50">NE-CPPA: A new and efficient conditional privacy-preserving authentication scheme for vehicular ad hoc networks (VANETs)</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">62. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:Zph67rFs4hoC"><span style="color:#2c3e50">A Survey on Data Dissemination and Routing Protocol in VANET: Types, Challenges, opportunistic and Future Role</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">63. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:_FxGoFyzp5QC"><span style="color:#2c3e50">A Study Review on Mobile Ad-Hoc Network: Characteristics, Applications, Challenges and Routing Protocols Classification</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">64. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:ufrVoPGSRksC"><span style="color:#2c3e50">Performance evaluation of active queue management algorithms in large network</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">65. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:YsMSGLbcyi4C"><span style="color:#2c3e50">BER Vs Eb/N0 BPSK Modulation over Different Types of Channel</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">66. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:zYLM7Y9cAGgC"><span style="color:#2c3e50">Hybrid Tow Feature Extraction Descriptor for Shape Pattern Recognition</span></a><span style="color:#2c3e50">.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">67. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:W7OEmFMy1HYC"><span style="color:#2c3e50">Monitoring the Cardiovascular Parameters (HR, RR, PBP) Under Pressure Situation</span></a></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">68. .</span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=ar&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:ZHo1McVdvXMC"><span style="color:#2c3e50">Successful Delivery Using Stable Multi-Hop Clustering Protocol for Energy Efficient Highway VANET</span></a><span style="color:#2c3e50">s.</span></span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="color:#2c3e50"><span style="font-size:14px">69. </span></span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=ar&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:pqnbT2bcN3wC"><span style="color:#2c3e50"><span style="font-size:14px">Wireless Body Area Networks: Applications and Congestion Control Technologies</span></span></a></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><a href="https://scholar.google.com/citations?view_op=view_citation&hl=ar&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:pqnbT2bcN3wC"><span style="color:#2c3e50"><span style="font-size:14px">70.</span></span></a><span style="color:#2c3e50"> Detection Systems for Distributed Denial-of-Service (DDoS) Attack Based on Time Series: A Review</span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><a href="https://scholar.google.com/citations?view_op=view_citation&hl=ar&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:pqnbT2bcN3wC"><span style="color:#2c3e50"><span style="font-size:14px">71.</span></span></a><span style="color:#2c3e50"> Data Acquisition Board by Using Arduino to Measure Weather Temperature and Humidity.</span></span></strong></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><a href="https://scholar.google.com/citations?view_op=view_citation&hl=ar&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:pqnbT2bcN3wC"><span style="color:#2c3e50"><span style="font-size:14px">72. </span></span></a><span style="color:#2c3e50">The Hyperthermia Calculating in Head Blood by the Specific Absorption Rate (SAR) Influence in Novel Vision.</span></span></strong></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">73. Link stability based multipath routing and effective mobility prediction in cognitive radio enabled vehicular ad hoc network.</span></strong></span></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="color:#2c3e50">74.</span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=ar&user=IYo_Z-gAAAAJ&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:rO6llkc54NcC"><span style="color:#2c3e50"> review of cryptocurrencies: Tether and ethereum‏</span></a><span style="color:#2c3e50"> </span></span></strong></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">75. Resource Allocation and Edge Computing for Dual Hop Communication in Satellite Assisted UAVs enabled VANETs.</span></strong></span></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">76. Enhancing Data Dissemination Security and Quality Through the Authenticated Relay Selection and Scheduling Framework (ARSSF) in VANET.</span></strong></span></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif">77.Transmission Power Reduction Based on an Enhanced Particle Swarm Optimization Algorithm in Wireless Sensor Network for Internet of Things</span></strong></span></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif"> </span></strong></span></p> <p><span style="color:#2c3e50"><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> <u> </u></span><u><span style="font-size:16px">Book</span></u></span></strong></span></p> <p><strong><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"><span style="color:#2c3e50">1. </span><a href="https://scholar.google.com/citations?view_op=view_citation&hl=en&user=IYo_Z-gAAAAJ&cstart=20&pagesize=80&sortby=pubdate&citation_for_view=IYo_Z-gAAAAJ:UeHWp8X0CEIC"><span style="color:#2c3e50">Hybrid Tow Feature Extraction Descriptor For Shape Pattern Recognition</span></a><span style="color:#2c3e50"> (</span></span><span style="color:#2c3e50">(ISBN:9786139584659)<span style="font-size:14px">.</span></span></span></strong></p> <p> </p> <p> </p>
No Certificates Available
No Information Available .
<p><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:22px"><strong><u>The papers that were reviewed:</u></strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">1. Improving Cotopaxi’s Lahars Signal Analysis and Detection Time With a Real Time Processing ArrayImproving Cotopaxi’s Lahars Signal Analysis and Detection Time With a Real Time Processing Array. <strong>(Cogent Engineering).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">2. Integration of Blockchain and Reinforcement Learning for Effectual Trust Evaluation in MANET-Disaster Scenarios.<strong> (Applied Artificial Intelligence).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">3. Hybrid Machine Learning Approach for Trust Evaluation to Secure MANET from Routing Attacks. <strong>(Applied Artificial Intelligence).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">4. Quality of Service Management for Fast Data Transmission in Industrial Mobile Communications using PSO based Computer Vision Technique. <strong>(Applied Artificial Intelligence)</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">5. Secure Communication and Malicious Node Detection Using Efficient Prevention Restricted Routing Protocol in MANET. <strong>(Applied Artificial Intelligence).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">6. Heuristic-Based Genetic Algorithm with Batesian Mimic Features for Secure Energy Efficient QoS Multicast Routing In Manet. <strong>(Cogent Engineering).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">7. EFFICIENT SECURITY FRAMEWORK AGAINST SYBIL ATTACK IN MOBILE ADHOC NETWORK USING EE-OLSR PROTOCOL SCHEME. <strong>(Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">8. Faco-cr: Dynamic Flying Ant Colony-based Congestion Control For Vehicular Ad Hoc Networks. <strong>(Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">9. Improved Ant Colony Algorithm for the Split Delivery Vehicle Routing Problem. <strong>(Scientific Programming).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">10. Self-healing Ais With Entropy Based Svm And Bayesian Aggregate Model For The Prediction And Isolation Of Malicious Nodes Triggering Dos Attacks In Vanet. <strong>(Journal of Interconnection Networks).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">11. Component based Effective Intrusion Detection System (CEIDS) for Seamless Data Communication in Vehicular Ad Hoc Network (VANET). <strong>(Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">12. A Secure Lightweight Authentication Model with Interference Aware Routing and Attack Detection Approach in VANET. (<strong>Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">13. 3D Wireless Sensor Network Deployment Coverage Optimization Based on Multi-objective Sparrow Search Algorithm. <strong>(Ad Hoc Networks).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">14. Design and Enhancement of Microstrip Patch Antenna Utilizing Mushroom Like-EBG for 5G Communications. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">15. Delay-oriented Resource Allocation for OFDMA Real Time Mobile Broadband Services. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">16. Optimized Deep Neural Model based Intrusion Detection System for Vehicular Adhoc Network . (<strong>Cybernetics and Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">17. Design of Efficient Energy Routing Protocol for Internet of Thing in Smart City. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">18. Blind Cfo Compensation for Next Gen Wlan Systems. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">19. Improving Mobility-aware Routing in Vehicular Ad Hoc Networks Considering Two Level Architecture. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">20. </span><a href="https://www.webofscience.com/wos/woscc/full-record/WOS:000925636700001"><span style="color:#000000">A transparent distributed ledger-based certificate revocation scheme for VANETs</span></a><span style="color:#000000">. <strong>(IEEE Access).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">21. A Directed Hypergraph Clustering Model (DiHGCM) in VANET - for Urban Scenario.<strong> (Computer Communications).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">22. Improved Search Pattern with Discrete Wavelet Transform for Video Steganography and Computer Forensics Application.<strong> (International Conference on Emerging Technologies and Intelligent Systems).</strong></span></span></p> <p><span style="font-size:14px"><span style="color:#000000">23. Evaluation of free space optics uplink availability to LEO satellite using Climatic data in cairo. <strong>(Journal of Communications).</strong></span></span></p> <p><span style="color:#000000"><span style="font-size:14px">24. E</span></span>fficient Privacy Preserving Lightweight Cryptography for Multi-hop Clustering in Internet of Vehicles Network.<strong>(Wireless Personal Communications)</strong></p> <p>25. SCVAN- BKM: Swarm Clustering for Vehicular Ad-hoc Network with a Secure Blockchain-Based Key Management Scheme.<strong>(Peer-to-Peer Networking and Applications) </strong> </p> <p> 26.Security in VANETs: Study and Analysis of Denial of Service (DOS) Attack and its Possible Solutions in VANETs Networks. <strong>(Security and Communication Networks) </strong></p> <p> </p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:14.0pt"><span style="font-family:"Times New Roman",serif"><span style="font-size:18px"> </span><span style="font-size:22px"> </span></span></span><span style="font-size:22px"><u>Certificates</u></span></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 1. Certificate of Teaching Methods, University of Anbar.</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 2. Certificate of participation (a seminar to keep pace with the rapid development of technology).</span></span></li> </ul> <p style="margin-left:-12px; margin-right:-46px; text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 3. Workshop Certificate (the best ways must follow the methodology of the research impact factor).</span></span></p> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 4. Certificate of participation (the English Language reinforcement Course).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 5. Certificate of participation (occupational conduct in medical laboratories).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 6. Certificate of participation (standards National classification and international classification of public and private universities and colleges).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 7. Certificate of participation from (Middle Technical University <span dir="RTL">/</span> Electrical Engineering Technical / Department of Computer Engineering Techniques).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 8. Certificate of participation (course of Internal Auditor or Head of Auditors).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 9. Certificate of participation (Cyber Security).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 10. Two Certificates of participation from (National Center For Development &Innovation).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 11. Certificate of (QMS for Accreditation of Laboratory Based on ISO 17025).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 12. Certificate of (Documentation of quality manual and procedures based on ISO 9001 & ISO 10013).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 13. Certificate of (QMS ISO 9001:2015).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 14.Certificate of (Good Laboratory Practice (GLP) Based According to Criteria of OECD on Testing and Calibration).</span></span></li> </ul> <ul> <li style="text-align:justify"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:14px"> 15.Certificate of Publons reviewer.</span></span></li> </ul> <p style="text-align:justify"> </p> <p style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><span style="font-size:14.0pt"><span style="font-family:"Times New Roman",serif"> </span></span><u><span style="font-size:14.0pt"><span style="font-family:"Times New Roman",serif"><span style="font-family:Arial,Helvetica,sans-serif"><span style="font-size:22px">Professional Membership</span></span></span></span></u></strong></span></span></p> <ul> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:14.0pt"><span style="font-family:"Times New Roman",serif"> 1. Union of Iraqi Engineers.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-size:14.0pt"><span style="font-family:"Times New Roman",serif"> 2. ARID platform.</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:14.0pt"><span style="font-family:"Times New Roman",serif"> 3. IEEE Member</span></span></li> </ul> <p> </p> <p> </p> <p> </p>