Iraqi Journal for Electrical and Electronic Engineering
Login
Iraqi Journal for Electrical and Electronic Engineering
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for protocols

Article
Design, Simulation, and Performance Evaluation of Reactive and Proactive Ad-Hoc Routing Protocols

Salah Abdulghani Alabady, Abdulhameed Nabeel Hameed

Pages: 1-15

PDF Full Text
Abstract

The primary goal of this study is to investigate and evaluate the performance of wireless Ad-Hoc routing protocols using the OPNET simulation tool, as well as to recommend the most effective routing strategies for the wireless mesh environment. Investigations have been testified to analyze the performance of the reactive and proactive Ad-Hoc routing protocols in different scenarios. Application and wireless metrics were configured that were used to test and evaluate the performance of routing protocols. The application metric includes web browsing metrics such as HTTP page response time, voice and video metrics such as end-to-end delay, and delay variation. The wireless network metrics include wireless media access delay, data dropped, wireless load, wireless retransmission attempts, and Packet Delivery Ratio. The simulations results show that the AODV overcome DSR and OLSR in terms of PDR (76%), wireless load (22.692 Mbps), voice delay variation (102.685 ms), HTTP page response time (15.317 sec), voice and video packet end-to-end delay (206.527 and 25.294 ms), wireless media access delay (90.150 ms), data dropped (10.003 Mbps), wireless load (22.692 Mbps), and wireless retransmission attempts (0.392 packets).

Article
Enhancing Packet Reliability in Wireless Multimedia Sensor Networks using a Proposed Distributed Dynamic Cooperative Protocol (DDCP) Routing Algorithm

Hanadi Al-Jabry, Hamid Ali Abed Al-Asadi

Pages: 158-168

PDF Full Text
Abstract

Wireless Multimedia Sensor Networks (WMSNs) are being extensively utilized in critical applications such as envi- ronmental monitoring, surveillance, and healthcare, where the reliable transmission of packets is indispensable for seamless network operation. To address this requirement, this work presents a pioneering Distributed Dynamic Coop- eration Protocol (DDCP) routing algorithm. The DDCP algorithm aims to enhance packet reliability in WMSNs by prioritizing reliable packet delivery, improving packet delivery rates, minimizing end-to-end delay, and optimizing energy consumption. To evaluate its performance, the proposed algorithm is compared against traditional routing protocols like Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR), as well as proactive routing protocols such as Optimized Link State Routing (OLSR). By dynamically adjusting the transmission range and selecting optimal paths through cooperative interactions with neighboring nodes, the DDCP algorithm offers effective solutions. Extensive simulations and experiments conducted on a wireless multimedia sensor node testbed demonstrate the superior performance of the DDCP routing algorithm compared to AODV, DSR, and OLSR, in terms of packet delivery rate, end-to-end delay, and energy efficiency. The comprehensive evaluation of the DDCP algorithm against multiple routing protocols provides valuable insights into its effectiveness and efficiency in improving packet reliability within WMSNs. Furthermore, the scalability and applicability of the proposed DDCP algorithm for large-scale wireless multimedia sensor networks are confirmed. In summary, the DDCP algorithm exhibits significant potential to enhance the performance of WMSNs, making it a suitable choice for a wide range of applications that demand robust and reliable data transmission.

Article
A Simulation of AODV and GPSR Routing Protocols in VANET Based on Multimetrices

Israa A. Aljabry, Ghaida A. Al-Suhail

Pages: 66-72

PDF Full Text
Abstract

Vehicular Ad hoc Networks (VANETs), a subsection of Mobile Ad hoc Networks (MANETs), have strong future application prospects. Because topology structures are rapidly changing, determining a route that can guarantee a good Quality of Service (QoS) is a critical issue in VANETs. Routing is a critical component that must be addressed in order to utilize effective communication among vehicles. The purpose obtained from this study is to compare the AODV and GPSR performance in terms of Packet Delivery Ratio, Packet Drop Ratio, Throughput, and End-to-End Delay by applying three scenarios, the first scenario focuses on studying these protocols in terms of QoS while changing the number of vehicles at a constant speed of 40Km/h, and for the second scenario changing the speed value while keeping a constant number of vehicles which is 100, the third involves changing the communication range at a constant speed and vehicle number. This study represents a foundation for researchers to help elaborate on the strength and weaknesses of these two protocols. OMNeT++ in conjunction with SUMO is used for simulation.

Article
Group Key Management Protocols for Non-Network: A Survey

Rituraj Jain, Dr. Manish Varshney

Pages: 214-225

PDF Full Text
Abstract

The phenomenal rise of the Internet in recent years, as well as the expansion of capacity in today’s networks, have provided both inspiration and incentive for the development of new services that combine phone, video, and text ”over IP.” Although unicast communications have been prevalent in the past, there is an increasing demand for multicast communications from both Internet Service Providers (ISPs) and content or media providers and distributors. Indeed, multicasting is increasingly being used as a green verbal exchange mechanism for institution-oriented programmers on the Internet, such as video conferencing, interactive college games, video on demand (VoD), TV over the Internet, e-learning, software programme updates, database replication, and broadcasting inventory charges. However, the lack of security within the multicast verbal exchange model prevents the effective and large-scale adoption of such important company multi-celebration activities. This situation prompted a slew of research projects that addressed a variety of issues related to multicast security, including confidentiality, authentication, watermarking, and access control. These issues should be viewed within the context of the safety regulations that work in the specific conditions. For example, in a public inventory charge broadcast, while identification is a vital necessity, secrecy is not. In contrast, video-convention programme requires both identification and confidentiality. This study gives a complete examination and comparison of the issues of group key management. Both network-dependent and network-independent approaches are used. The study also addresses the advantages, disadvantages, and security problems of various protocols.

Article
Encoding JSON by using Base64

Mohammed Thakir Shaamood

Pages: 29-37

PDF Full Text
Abstract

Transmitting binary data across a network should generally avoid transmitting raw binary data over the medium for several reasons, one would be that the medium may be a textual one and may not accept or correctly handle raw bitstream, another would be that some protocols may misinterpret the meaning of the bits and causes a problem or even loss of the data. To make the data more readable and would avoid misinterpretation by different systems and environments, this paper introduces encoding two of the most broadly used data interchange formats, XML and JSON, into the Base64 which is an encoding scheme that converts binary data to an ASCII string format by using a radix-64 representation. This process, will, make the data more readable and would avoid misinterpretation by different systems and environments. The results reflect that encoding data in Base64 before the transmission will present many advantages including readability and integrity, it will also enable us to transmit binary data over textual mediums, 7 Bit protocols such as SMTP, and different network hardware without risking misinterpretation.

Article
A Framework for Sensor Fusing Using Fuzzy Logic for Navigation Systems

Wong Wei Kitt, Ali Chekima, Jamal A. Dhargam, Farrah Wong, Tamer A.Tabet

Pages: 83-88

PDF Full Text
Abstract

Navigational sensors are evolving both on a commercial and research level. However, the limitation still lies in the accuracy of the respective sensors. For a navigation system to reach a certain accuracy, multi sensors or fusion sensors are used. In this paper, a framework of fuzzy sensor data fusing is proposed to obtain an optimised navigational system. Different types of sensors without a known state of inaccuracy can be fused using the same method proposed. This is demonstrated by fusing compass/accelerometer and GPS signal. GPS is prone to inaccuracies due to environmental factors. These inaccuracies are available in the extracted NMEA protocols as SNR and HDOP. Dead reckoning sensors on the other hand do not depend on external radio signal coverage and can be used in areas with low coverage, but the errors are unbounded and have an accumulative effect over time.

Article
Saturation Throughput and Delay Performance Evaluation of the IEEE 802.11g/n for a Wireless Lossy Channel

Salah A. Alabady

Pages: 51-64

PDF Full Text
Abstract

Non-ideal channel conditions degrade the performance of wireless networks due to the occurrence of frame errors. Most of the well-known works compute the saturation throughput and packet delay for the IEEE 802.11 Distributed Coordination Function (DCF) protocol with the assumption that transmission is carried out via an ideal channel (i.e., no channel bit errors or hidden stations), and/or the errors exist only in data packets. Besides, there are no considerations for transmission errors in the control frames (i.e., Request to Send (RTS), Clear to Send (CTS), and Acknowledgement (ACK)). Considering the transmission errors in the control frames adds complexity to the existing analysis for the wireless networks. In this paper, an analytical model to evaluate the Medium Access Control (MAC) layer saturation throughput and packet delay of the IEEE 802.11g and IEEE 802.11n protocols in the presence of both collisions and transmission errors in a non-ideal wireless channel is provided. The derived analytical expressions reveal that the saturation throughput and packet delay are affected by the network size (n), packet size, minimum backoff window size (W min ), maximum backoff stage (m), and bit error rate (BER). These results are important for protocol optimization and network planning in wireless networks .

Article
Authentication Healthcare Scheme in WBAN

Abdullah Mohammed Rashid, Ali A. Yassin, Abdulla J. Y. Aldarwish, Aqeel A. Yaseen, Hamid Alasadi, Ammar Asaad, Alzahraa J. Mohammed

Pages: 118-127

PDF Full Text
Abstract

A wireless body area network (WBAN) connects separate sensors in many places of the human body, such as clothes, under the skin. WBAN can be used in many domains such as health care, sports, and control system. In this paper, a scheme focused on managing a patient’s health care is presented based on building a WBAN that consists of three components, biometric sensors, mobile applications related to the patient, and a remote server. An excellent scheme is proposed for the patient’s device, such as a mobile phone or a smartwatch, which can classify the signal coming from a biometric sensor into two types, normal and abnormal. In an abnormal signal, the device can carry out appropriate activities for the patient without requiring a doctor as a first case. The patient does not respond to the warning message in a critical case sometimes, and the personal device sends an alert to the patient’s family, including his/her location. The proposed scheme can preserve the privacy of the sensitive data of the patient in a protected way and can support several security features such as mutual authentication, key management, anonymous password, and resistance to malicious attacks. These features have been proven depending on the Automated Validation of Internet Security Protocols and Applications. Moreover, the computation and communication costs are efficient compared with other related schemes.

Article
A New Model For Endocrine Glucose-Insulin Regulatory System

Abdul-Basset A. Al-Hussein, Fadhil Rahma Tahir

Pages: 1-8

PDF Full Text
Abstract

To gain insight into complex biological endocrine glucose-insulin regulatory system where the interactions of components of the metabolic system and time-delay inherent in the biological system give rise to complex dynamics. The modeling has increased interest and importance in physiological research and enhanced the medical treatment protocols. This brief contains a new model using time delay differential equations, which give an accurate result by utilizing two explicit time delays. The bifurcation analysis has been conducted to find the main system parameters bifurcation values and corresponding system behaviors. The results found consistent with the biological experiments results.

Article
Fuzzy Transmission Power Control Scheme for Maximizing Lifetime in Wireless Sensor Networks

Safaa Khudair Leabi, Turki Younis Abdalla

Pages: 174-182

PDF Full Text
Abstract

Energy limitations have become fundamental challenge for designing WSNs. Network lifetime is the most interested and important metric in WSNs. Many works have been developed for prolonging networks lifetime, in which one of the important work is the control of transmission power. This paper proposes a new fuzzy transmission power control technique that operate together with routing protocols for prolonging WSNs lifetime. Dijkstra shortest path routing is considered as the main routing protocol in this work. This paper mainly focuses on transmission power control scheme for prolonging WSNs lifetime. A performance comparison is depicted for maximum and controlled transmission power. Simulation results show an increase in network lifetime equals to 3.4776 for the proposed fuzzy control. The performance of the proposed fuzzy control technique involves a good improvement and contribution in the field of prolonging networks lifetime by using transmission power control.

Article
Improvement of AODV Routing on MANETS Using Fuzzy Systems

Taqwa Odey Fahad, Prof. Abduladhim A. Ali

Pages: 102-106

PDF Full Text
Abstract

Most of routing protocols used for Mobile Ad hoc Network (MANET), such as Ad hoc on demand distance vector (AODV) routing, uses minimum hops as the only metric for choosing a route. This decision might lead to cause some nodes become congested which will degrade the network performance. This paper proposes an improvement of AODV routing algorithm by making routing decisions depend on fuzzy cost based on the delay in conjunction with number of hops in each path. Our simulation was carried out using OMNET++ 4.0 simulator and the evaluation results show that the proposed Fuzzy Multi-Constraint AODV routing performs better than the original AODV in terms of average end-to-end delay and packet delivery.

1 - 11 of 11 items

Search Parameters

Journal Logo
Iraqi Journal for Electrical and Electronic Engineering

College of Engineering, University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering, University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.