Omar Adil Mahdi
YOU?
Author Swipe
View article: Enhancing Routing Efficiency in VANETs by Leveraging 5G to Mitigate Congestion
Enhancing Routing Efficiency in VANETs by Leveraging 5G to Mitigate Congestion Open
Transportation networks impact millions of people daily. Their efficiency immediately affects travel time, safety, and environmental sustainability. Unfortunately, various issues hinder the expected performance and efficiency of these netw…
View article: Hotspot Issue Handling and Reliable Data Forwarding Technique for Ocean Underwater Sensor Networks
Hotspot Issue Handling and Reliable Data Forwarding Technique for Ocean Underwater Sensor Networks Open
View article: Blue Laser Underwater Optical Visible Light Communication Using Recursive OFDM
Blue Laser Underwater Optical Visible Light Communication Using Recursive OFDM Open
Water covers more than 75% of the earth's surface in the form of the ocean. The ocean investigation is far-fetched because the underwater environment has distinct phenomenal activities. The expansion of human activities inside underwater e…
View article: An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service
An efficient node selection algorithm in the context of IoT-based vehicular ad hoc network for emergency service Open
With the recent growth of global populations, main roads in cities have witnessed an evident increase in the number of vehicles. This has led to unprecedented challenges for authorities in managing the traffic of ambulance vehicles to prov…
View article: Proposal of Audio Compression Methods Using Text Coding
Proposal of Audio Compression Methods Using Text Coding Open
النظام المقترح هو طريقة جديدة لضغط الملفات الصوتية ، عن طريق تحويل ملف صوتي إلى ملف نصي ثم ضغط الملف النصي الجديد باستخدام تقنيات الضغط الشائعة. يتم استخدام طريقتين ترميز مقترحتين (4 بت) و (6 بت) لتحويل ملف صوتي مرقم إلى ملف نصي باستخدام ط…
View article: Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks
Void-hole aware and reliable data forwarding strategy for underwater wireless sensor networks Open
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks …
View article: Lightweight route adjustment strategy for mobile sink wireless sensor networks
Lightweight route adjustment strategy for mobile sink wireless sensor networks Open
As a result of numerous applications and low installation costs, wireless sensor networks (WSNs) have expanded excessively. The main concern in the WSN environment is to lower energy consumption amidst nodes while preserving an accep…
View article: An online COVID-19 self-assessment framework supported by IoMT technology
An online COVID-19 self-assessment framework supported by IoMT technology Open
As COVID-19 pandemic continued to propagate, millions of lives are currently at risk especially elderly, people with chronic conditions and pregnant women. Iraq is one of the countries affected by the COVID-19 pandemic. Currently, in Iraq,…
View article: An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks Open
Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limit…
View article: Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments
Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments Open
As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with rega…
View article: Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review
Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review Open
The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, …
View article: Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network Open
Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety…
View article: Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm Open
Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high…
View article: WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs Open
Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation…
View article: Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis Open
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud n…