Haydar Abdulameer Marhoon
Florida State University College of Arts and Sciences
TCP accelerationRouting protocolSoftware deploymentWireless networkThe InternetAlgorithmCacheDistributed computingTCP tuningArchitectureData miningEngineeringSocial relationDynamic network analysisMatrix (mathematics)Network simulationMean squared errorSignature (logic)Feature selectionRule-based systemModels of communicationNetwork packetHealth careTCP global synchronizationReliability (computer networking)Chain (algebraic topology)Set (abstract data type)Layer (object-oriented design)Hierarchical routingRetransmissionCloud computing securityEnergy (signal processing)HSTCPZone Routing ProtocolNetwork congestionPolicy-based routingKey (cryptography)Static routingMetric (mathematics)Singular value decompositionWireless sensor networkEfficient energy useSimilarity (psychology)SoftwareCervical cancerPurchasingDimension (data warehouse)Content centric networkingEnergy consumptionBottleneckIot architectureHigh securityTCP Friendly Rate ControlComputer networkTransmission Control ProtocolField (computer science)End-to-end delayComputer securityAnt colony optimization algorithmsComputer scienceBase (topology)Table (database)Node (networking)Wireless Routing ProtocolScalabilityQuality of serviceInterior gateway protocolBat algorithmPacket lossRecommender systemLine (text file)Data setInternet protocol suiteBase stationConfidentialityData redundancyRouting Information ProtocolTCP delayed acknowledgmentCloud computingInternet of ThingsEnhanced Interior Gateway Routing ProtocolLink-state routing protocolPath (graph theory)Protocol (object-oriented programming)Mobile ad hoc networkRouting domainDynamic Source Routing
15Publications
2H-index
21Citations
Publications 15
Newest
Recommender systems suffer a set of drawbacks such as sparsity. Social relations provide a useful source to overcome the sparsity problem. Previous studies have utilized social relations or rating feedback sources. However, they ignored integrating these sources. In this paper, the limitations of previous studies are overcome by exploiting four sources of information, namely: explicit social relationships, implicit social relationships, users’ ratings, and implicit feedback information. Firstly,...
Source
Content-Centric Networking (CCN) is a novel modern architecture for the Internet in the future. This architecture concentrates on content retrieval and dissemination solution for communication models. Forwarding strategies are decision-making strategies whose aim is to define the forwarding destination, i.e., where and when request packets will be redirected. They are considered as the most crucial component in a network environment because of their contribution to determining which strategy is ...
Source
#1Sabah M. AlturfiH-Index: 1
#2Bahaa Al-MusawiH-Index: 4
view all 3 authors...
Cloud computing provides scalable, on-demand, and highly available computing resources via the internet to both the public and private on a pay-per-use basis. It eliminates the requirement of purchasing new hardware and software licenses besides reducing administration efforts. The key issue of cloud computing is the security of its resources and data and need to be protected from different attacks. Different research studies have been proposed various methods for intrusion detection and prevent...
Source
#1Sabah M. AlturfiH-Index: 1
Last. Bahaa Al-MusawiH-Index: 4
view all 3 authors...
With the rapid growth of Internet technologies, Internet of Things (IoT) devices have become widely required. A huge number of smart devices around the world containing sensors and actuators are collecting data and processing it to perform specific actions. As these services deployed via the Internet, it becomes an easy target to the vulnerabilities. The defenses against these threats need to maximize and ensure high security to maintain the confidentiality, availability, and integrity of IoT re...
1 CitationsSource
#1Rafid Sagban (University of Babylon)H-Index: 5
Last. Raaid Alubady (University of Babylon)H-Index: 4
view all 3 authors...
Rule-based classification in the health field using artificial intelligence went away to rendering solutions in decision-making problems in different domains. The most important of these challenges is access to good and fast health facilities, which pose a major threat to injure the disease. Cervical cancer is one of the most frequent causes of death to the female. The diagnosis methods for cervical cancer used in health centers are costly and time-consuming. In this paper, Bat Algorithm for Fea...
Source
1 CitationsSource
Mobile Ad-hoc Network (MANET) is a special type of wireless network with self-organizing, building shared routing information, dynamic network connectivity without any dependence on fixed infrastructures for wireless communication. However, the dynamics and the unpredictable behavior of wireless Mobile Ad-hoc Networks (MANET) results in hindrance are providing sufficient reliability to the network connection. Frequent route changes in the network relatively introduce incessant link failure, whic...
Source
#2Massudi MahmuddinH-Index: 9
Last. Shahrudin Awang NorH-Index: 6
view all 3 authors...
Source
#2Massudi Mahmuddin (UUM: Universiti Utara Malaysia)H-Index: 9
Last. Ahmed Sileh GifalH-Index: 1
view all 5 authors...
Wireless Sensor Network (WSN) is a large number of small sensor devices that can connect each other wirelessly. WSNs applications are rapidly growing in last decades, furthermore, in WSN research, energy is one of the important issues that must consider when designing a new protocol. Due to the fact, almost all of nodes' energy deplete in the communication part, and the data fusing directly impact the performance of routing protocol. This paper studies the impact of data fusing for chain based r...
2 CitationsSource
Wireless Sensor Network (WSN) consists of small sensor devices, which are connected wirelessly for sensing and delivering specific data to Base Station (BS). Routing protocols in WSN becomes an active area for both researchers and industrial, due to its responsibility for delivering data, extending network lifetime, reducing the delay and saving the node’s energy. According to hierarchical approach, chain base routing protocol is a promising type that can prolong the network lifetime and decreas...