70 results on '"Mohammed, Hawa"'
Search Results
2. Cognitive Radio Based Directional Comparison Blocking Relaying Scheme.
- Author
-
Mohammed A. Haj-Ahmed and Mohammed Hawa
- Published
- 2021
- Full Text
- View/download PDF
3. A Graphical User Interface for the ns-3 Simulator.
- Author
-
Mohammed Hawa
- Published
- 2020
- Full Text
- View/download PDF
4. Isolation and Genetic Characterization of Genotype VII Velogenic Pathotype Newcastle Disease Virus from Commercial Chicken Farms in Central Ethiopia, Distinct from the Local Vaccine Strains.
- Author
-
Yadeta, Waktole, Amosun, Elizabeth, Mohammed, Hawa, Woldemedhin, Wubet, Sherefa, Kedir, Legesse, Abinet, Deresse, Getaw, Birhanu, Kenaw, Abayneh, Takele, Getachew, Belayneh, Farnós, Omar, Kamen, Amine A., and Gelaye, Esayas
- Subjects
NEWCASTLE disease virus ,NEWCASTLE disease ,AMINO acid sequence ,REPRODUCTIVE isolation ,CHIMERIC proteins - Abstract
Newcastle disease (ND) is caused by virulent strains of avian paramyxovirus type 1, also known as Newcastle disease virus (NDV). Despite vaccination, the frequency of reported outbreaks in Ethiopia has increased. From January to June 2022, an active outbreak investigation was conducted in six commercial chicken farms across areas of central Ethiopia to identify the circulating NDV strains. Thirty pooled tissue specimens were collected from chickens suspected of being infected with NDV. A questionnaire survey of farm owners and veterinarians was also carried out to collect information on the farms and the outbreak status. NDV was isolated using specific-pathogen-free (SPF)-embryonated chicken eggs and detected using haemagglutination and the reverse transcriptase–polymerase chain reaction (RT–PCR). The genotype and virulence of field NDV isolates were determined using phylogenetic analysis of fusion (F) protein gene sequences and the mean death time (MDT) test in SPF-embryonated chicken eggs. The questionnaire results revealed that ND caused morbidity (23.1%), mortality (16.3%), case fatality (70.8%), and significant economic losses. Eleven of thirty tissue specimens tested positive for NDV using haemagglutination and RT–PCR. The MDT testing and sequence analysis revealed the presence of virulent NDV classified as genotype VII of class II velogenic pathotype and distinct from locally used vaccine strains (genotype II). The amino acid sequences of the current virulent NDV fusion protein cleavage site motif revealed
112 RRQKR↓F117 , unlike the locally used avirulent vaccine strains (112 GRQGR↓L117 ). The epidemiological data, MDT results, cleavage site sequence, and phylogenetic analysis all indicated that the present NDV isolates were virulent. The four NDV sequences were deposited in GenBank with accession numbers F gene (PP726912-15) and M gene (PP726916-19). The genetic difference between avirulent vaccine strains and circulating virulent NDV could explain the low level of protection provided by locally used vaccines. Further studies are needed to better understand the circulating NDV genotypes in different production systems. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
5. Cognitive Radio_Based Backup Protection Scheme for Smart Grid Applications
- Author
-
Mohammed A. Hajahmed, Mohammed Hawa, Laith A. Shamlawi, Sahban Alnaser, Yazan Alsmadi, and Dia Abualnadi
- Subjects
Cognitive radio ,green communication ,IEC-61850-9-2 process bus ,microgrids ,smart grid ,overcurrent protection ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In this paper, a backup protection scheme is presented. The proposed scheme uses the concept of a cognitive radio-based wireless sensor network to implement a protection scheme without the need for conventional electric wires and/or optical fiber between current and voltage transducers, control panels, and circuit breakers. The proposed scheme uses unlicensed spectrum channels by applying spectrum sensing and frequency allocation algorithms that are used in cognitive radio based systems. The importance of the proposed scheme comes from its cost effectiveness compared to the Ethernet communication both wired and wireless if the data transfer and message exchange is done using cognitive radio_based communication for relatively long distances. The proposed scheme utilizes cognitive radio-based communication network to convey analog and digital signals within a substation. In this way, it saves the cost of the copper wires and/or optical fiber that would be used to transmit digital and analog signals. Further, it does not require the expensive spectrum licenses that would have been purchased if Ethernet long-distance wireless communications are utilized. To assess the benefits/challenges related to the application of cognitive radio_based communication, a detailed and realistic modeling of both power systems and cognitive radio_based communication systems is performed simultaneously. The proposed scheme is simulated using MATLAB/Simulink and performance of the proposed scheme was investigated under different communication scenarios.
- Published
- 2020
- Full Text
- View/download PDF
6. Sequence-based comparison of field and vaccine strains of infectious bursal disease virus in Ethiopia reveals an amino acid mismatch in the immunodominant VP2 protein
- Author
-
Shegu, Dereje, Sori, Teshale, Tesfaye, Asaminew, Belay, Alebachew, Mohammed, Hawa, Degefa, Teferi, Getachew, Belayneh, Abayneh, Takele, and Gelaye, Esayas
- Published
- 2020
- Full Text
- View/download PDF
7. LDAB-GPSR: Location PreDiction with Adaptive Beaconing – Greedy Perimeter Stateless Routing Protocol for Mobile Ad Hoc Networks
- Author
-
Ramzi Saifan, Samer Abu-Zant, Sharhabeel H. Alnabelsi, Mohammed Hawa, and Fahed Jubair
- Subjects
Control and Systems Engineering ,Electrical and Electronic Engineering ,Computer Science Applications - Abstract
In mobile ad-hoc networks (MANET), nodes are randomly distributed and move freely, and hence the network may face rapid and unexpected topological changes. In this paper, an improved greedy perimeter stateless routing protocol, called “LDAB-GPSR”, is proposed. LDAB-GPSR mainly focuses on maximizing the packet delivery ratio while minimizing the control overhead. In order to accomplish this, two techniques are introduced, the first one is the location prediction technique in which the greedy forwarding strategy is improved by choosing more stable routes for data forwarding. The second one is the adaptive beaconing technique in which the slow start algorithm is employed to adapt the beacon packet interval time based on the mobility of nodes and the data traffic load instead of using the periodic beaconing strategy. These two strategies together improve the overall performance of the GPSR routing protocol. The performance of the new proposed protocol is evaluated by carrying out several NS-2.35 simulation experiments. The simulation results show that LDAB-GPSR protocol outperforms the GPSR+Predict protocol in terms of packet delivery ratio, control traffic overhead, end to end delay, and throughput. The ratios of enhancement approaches 40%.
- Published
- 2022
8. An improved image least significant bit replacement method.
- Author
-
Khalid A. Darabkh, Iyad F. Jafar, Raed T. Al-Zubi, and Mohammed Hawa
- Published
- 2014
- Full Text
- View/download PDF
9. Cognitive Radio-Based Directional Comparison Blocking Relaying Scheme
- Author
-
Mohammed A. Haj-Ahmed and Mohammed Hawa
- Subjects
Control and Systems Engineering ,Electrical and Electronic Engineering ,Industrial and Manufacturing Engineering - Published
- 2022
10. On Using Spectrum History to Manage Opportunistic Access in Cognitive Radio Networks
- Author
-
Mohammed Hawa, Dia I Abu-Al-Nadi, Othman M. K. Alsmadi, and Iyad F. Jafar
- Subjects
Cognitive radio networks ,spectrum management ,decentralized ,frequency switching cost ,history ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Cognitive radio networks (CRNs) open up the underutilized parts of the licensed spectrum for secondary reuse, so long as this secondary access does not cause harmful interference to the licensed users. Being able to run CRNs in a completely decentralized manner, as opposed to centralized operation, can be quite advantageous, because it avoids the complexity and single point-of-failure issues that arise from the presence of a central controller, and also eliminates the difficult step of establishing and maintaining a common control channel, which can suffer from saturation and malicious attacks. To that end, we propose in this paper a novel decentralized spectrum allocation technique for CRNs that not only provides great performance in terms of high throughput, excellent fairness, and minimal interference between cognitive users but also provides very stable network operation, in which cognitive users do not have to switch their operating frequency quite regularly. This is achieved by systematically observing the history of the spectrum usage to determine the proper channel assignment in the CRN. Our proposed technique is intuitive, is completely decentralized, and allows for quick reaction to changes in the CRN, such as when the primary users licensed to use the spectrum are suddenly activated.
- Published
- 2016
- Full Text
- View/download PDF
11. Exploiting Obstacle Geometry to Reduce Search Time in Grid-Based Pathfinding
- Author
-
Fahed Jubair and Mohammed Hawa
- Subjects
shortest-path problem ,path planning ,heuristic algorithms ,computational geometry ,Mathematics ,QA1-939 - Abstract
Pathfinding is the problem of finding the shortest path between a pair of nodes in a graph. In the context of uniform-cost undirected grid maps, heuristic search algorithms, such as A ★ and weighted A ★ ( W A ★ ), have been dominantly used for pathfinding. However, the lack of knowledge about obstacle shapes in a gird map often leads heuristic search algorithms to unnecessarily explore areas where a viable path is not available. We refer to such areas in a grid map as blocked areas (BAs). This paper introduces a preprocessing algorithm that analyzes the geometry of obstacles in a grid map and stores knowledge about blocked areas in a memory-efficient balanced binary search tree data structure. During actual pathfinding, a search algorithm accesses the binary search tree to identify blocked areas in a grid map and therefore avoid exploring them. As a result, the search time is significantly reduced. The scope of the paper covers maps in which obstacles are represented as horizontal and vertical line-segments. The impact of using the blocked area knowledge during pathfinding in A ★ and W A ★ is evaluated using publicly available benchmark set, consisting of sixty grid maps of mazes and rooms. In mazes, the search time for both A ★ and W A ★ is reduced by 28 % , on average. In rooms, the search time for both A ★ and W A ★ is reduced by 30 % , on average. This is achieved while preserving the search optimality of A ★ and the search sub-optimality of W A ★ .
- Published
- 2020
- Full Text
- View/download PDF
12. Comparative Safety, Immunogenicity, and Efficacy of CEF Cell-Based and DF-1 Cell Line Adapted Infectious Bursal Disease Vaccines in Specific-Pathogen-Free Chickens
- Author
-
Workineh, Daniel, primary, Bitew, Molalegne, additional, Oluwayelu, Daniel, additional, Getachew, Belayneh, additional, Abayneh, Takele, additional, Gelaye, Esayas, additional, Mohammed, Hawa, additional, Fikru, Tedros, additional, Birhan, Mastewal, additional, Dessalegn, Bereket, additional, Deresse, Getaw, additional, Adamu, Kassaye, additional, and Ibrahim, Saddam Mohammed, additional
- Published
- 2022
- Full Text
- View/download PDF
13. Vieterbi decoder algorithm using quantum computing.
- Author
-
Jamal S. Rahhal, Mohammed Hawa, and Dia I. Abu-Al-Nadi
- Published
- 2007
- Full Text
- View/download PDF
14. Impact of Tobacco Use in the Etiology of Chronic Renal Failure Among Sudanese Patients
- Author
-
Idris, Alkhair Abd Almahmoud, primary, Mohammed, Hawa Ishag, additional, and Osman, Mawahib Ishag, additional
- Published
- 2022
- Full Text
- View/download PDF
15. Cognitive Radio_Based Backup Protection Scheme for Smart Grid Applications
- Author
-
Dia I. Abu-Al-Nadi, Laith A. Shamlawi, Mohammed A. Haj-ahmed, Yazan M. Alsmadi, Mohammed Hawa, and Sahban W. Alnaser
- Subjects
Ethernet ,General Computer Science ,Computer science ,business.industry ,020208 electrical & electronic engineering ,General Engineering ,020206 networking & telecommunications ,02 engineering and technology ,Communications system ,Telecommunications network ,Spectrum management ,Frequency allocation ,Smart grid ,Cognitive radio ,0202 electrical engineering, electronic engineering, information engineering ,Electronic engineering ,Wireless ,General Materials Science ,business ,Wireless sensor network ,Communication channel ,Data transmission - Abstract
In this paper, a backup protection scheme is presented. The proposed scheme uses the concept of a cognitive radio-based wireless sensor network to implement a protection scheme without the need for conventional electric wires and/or optical fiber between current and voltage transducers, control panels, and circuit breakers. The proposed scheme uses unlicensed spectrum channels by applying spectrum sensing and frequency allocation algorithms that are used in cognitive radio based systems. The importance of the proposed scheme comes from its cost effectiveness compared to the Ethernet communication both wired and wireless if the data transfer and message exchange is done using cognitive radio_based communication for relatively long distances. The proposed scheme utilizes cognitive radio-based communication network to convey analog and digital signals within a substation. In this way, it saves the cost of the copper wires and/or optical fiber that would be used to transmit digital and analog signals. Further, it does not require the expensive spectrum licenses that would have been purchased if Ethernet long-distance wireless communications are utilized. To assess the benefits/challenges related to the application of cognitive radio_based communication, a detailed and realistic modeling of both power systems and cognitive radio_based communication systems is performed simultaneously. The proposed scheme is simulated using MATLAB/Simulink and performance of the proposed scheme was investigated under different communication scenarios.
- Published
- 2020
16. Gender Difference in Students’ Attitude Towards English Language in Selected Senior High Schools in the Sunyani Municipality of the Bono Region of Ghana
- Author
-
Mohammed, Hawa-Kullu, primary
- Published
- 2022
- Full Text
- View/download PDF
17. Immunogenicity and Efficacy Evaluation of Vero Cell-Adapted Infectious Bursal Disease Virus LC-75 Vaccine Strain
- Author
-
Kebede, Wakjira, primary, Bitew, Molalegne, additional, Bari, Fufa Dawo, additional, Edao, Bedaso Mammo, additional, Mohammed, Hawa, additional, Yami, Martha, additional, Getachew, Belayneh, additional, Abayneh, Takele, additional, and Gelaye, Esayas, additional
- Published
- 2021
- Full Text
- View/download PDF
18. Evolutionary Computation in Coded Communications: an Implementation of Viterbi Algorithm
- Author
-
Dia I. Abu-Al-Nadi, Jamal S. Rahhal, and Mohammed Hawa
- Subjects
Quantum decoherence ,Theoretical computer science ,Quantum register ,Computer science ,TheoryofComputation_GENERAL ,Quantum Physics ,Computer Science::Hardware Architecture ,Computer Science::Emerging Technologies ,Quantum gate ,Quantum error correction ,ComputerSystemsOrganization_MISCELLANEOUS ,Qubit ,Quantum algorithm ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Arithmetic ,Quantum ,Quantum computer - Abstract
Quantum Computing hopefully is the future of computing systems. It still on its first steps. The development of some quantum algorithms gives the quantum computing a boost on its importance. These algorithms (such as Shor’s and Grover’s algorithms) proved to have superior performance over classical algorithms [1-4]. The recent findings, that quantum error correction can be used, showed that the decoherence problem can be solved and hence the quantum computers can be realized [5-7]. The quantum algorithms are based on the use of special gates applied on one, two or more qubits (quantum bits). The classical computer uses different gates (NOT, AND, NAND, OR and XOR). Quantum gates are in many aspects different from classical gates where all gates must be reversible. This makes the quantum gates act as 2x2 transformation operators, where we have n input qubits and n output qubits. To understand the quantum bits and gates we describe the group of amplitudes that describes the state of a quantum register as a vector. A qubit with state 0 , which is
- Published
- 2021
19. Immunogenicity and Efficacy Evaluation of Vero Cell-Adapted Infectious Bursal Disease Virus LC-75 Vaccine Strain
- Author
-
Kebede,Wakjira, Bitew,Molalegne, Bari,Fufa Dawo, Edao,Bedaso Mammo, Mohammed,Hawa, Yami,Martha, Getachew,Belayneh, Abayneh,Takele, Gelaye,Esayas, Kebede,Wakjira, Bitew,Molalegne, Bari,Fufa Dawo, Edao,Bedaso Mammo, Mohammed,Hawa, Yami,Martha, Getachew,Belayneh, Abayneh,Takele, and Gelaye,Esayas
- Abstract
Wakjira Kebede,1 Molalegne Bitew,2 Fufa Dawo Bari,3 Bedaso Mammo Edao,3 Hawa Mohammed,1 Martha Yami,1 Belayneh Getachew,1 Takele Abayneh,1 Esayas Gelaye1 1National Veterinary Institute, Bishoftu, Ethiopia; 2Ethiopian Biotechnology Institute, Addis Ababa, Ethiopia; 3College of Veterinary Medicine and Agriculture, Addis Ababa University, Bishoftu, EthiopiaCorrespondence: Esayas GelayeNational Veterinary Institute (NVI), PO Box: 19, Bishoftu, EthiopiaTel +251 923625362Fax +251 114339300Email esayasgelaye@gmail.comFufa Dawo BariCollege of Veterinary Medicine and Agriculture, Addis Ababa University, PO Box: 34, Bishoftu, EthiopiaTel +251 929190312Fax +251 114339933Email fufa.dawo@aau.edu.etIntroduction: Infectious bursal disease virus (IBDV) is an avian viral pathogen that causes infectious bursal disease (IBD) of chickens. The disease has been endemic in Ethiopia since 2002, and vaccination has been practiced as the major means of disease prevention and control. An IBD vaccine is produced in Ethiopia using primary chicken embryo fibroblast (CEF) cell, which is time-consuming, laborious, and uneconomical. The present study was carried out to develop cell-based IBDV LC-75 vaccine using Vero cells and to evaluate the safety, immunogenicity and protection level.Methods: Identity of the vaccine seed was confirmed with gene-specific primers using reverse transcription polymerase chain reaction (RT-PCR). Confluent monolayer of Vero cells was infected with vaccine virus and serial passage continued till passage 10. A characteristic virus-induced cytopathic effect (CPE) was observed starting from passage 2 on the third day post-infection. The infectious titer of adapted virus showed a linear increment along the passage level. The virus-induced specific antibody was determined using indirect ELISA after vaccination of chicks through ocular route.Results: The antibody titer measured from Vero cells vaccinated chicks revealed similar level with the currently available CEF cell-base
- Published
- 2021
20. Immunogenicity and Efficacy Evaluation of Vero Cell-Adapted Infectious Bursal Disease Virus LC-75 Vaccine Strain in Ethiopia
- Author
-
Kebebe, Wakjira, primary, Bitew, Molalegne, additional, Dawo, Fufa, additional, Mammo, Bedaso, additional, Mohammed, Hawa, additional, Yami, Martha, additional, Getachew, Belayneh, additional, Abayneh, Takele, additional, and Gelaye, Esayas, additional
- Published
- 2021
- Full Text
- View/download PDF
21. MT-CHR: A modified threshold-based cluster head replacement protocol for wireless sensor networks
- Author
-
Wala'a S. Al-Rawashdeh, Ramzi Saifan, Khalid A. Darabkh, and Mohammed Hawa
- Subjects
General Computer Science ,Computer science ,business.industry ,Node (networking) ,020206 networking & telecommunications ,02 engineering and technology ,Data loss ,Threshold energy ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Cluster (physics) ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Cluster analysis ,business ,Protocol (object-oriented programming) ,Wireless sensor network ,Energy (signal processing) ,Computer network - Abstract
The Threshold-based Low-energy Adaptive Clustering Hierarchy (T-LEACH) protocol declares that cluster heads do not have to turn over every round but rather every batch of rounds. In other words, nodes keep serving as cluster heads as long as their energy is higher than a threshold energy. This article imposes upon major drawbacks of T-LEACH protocol and presents a Modified Threshold-based Cluster Head Replacement (MT-CHR) protocol. In the MT-CHR protocol, a new probability of being a cluster head, for any node in any round, has been proposed which agrees fairly with the assumptions introduced in LEACH protocol. Moreover, a new expression for threshold energy is proposed in which delaying the first node death and avoiding any data loss are taken into consideration. The performance of MT-CHR is evaluated using alive nodes, network lifetime, as well as network utilization performance metrics. The results are further compared with those obtained importantly from LEACH and T-LEACH protocols and the contributions of MT-CHR protocol are extremely impressive. As far as the real sensor network is concerned, the MT-CHR protocol is highly applicable and very effective as long-lasting networks are ascertained.
- Published
- 2018
22. RSP-WRAN: Resource sharing protocol for inter/intra WRAN communications
- Author
-
Iyad F. Jafar, Khalid A. Darabkh, Mohammed Hawa, and Raed T. Al-Zubi
- Subjects
020203 distributed computing ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,business.industry ,0202 electrical engineering, electronic engineering, information engineering ,020206 networking & telecommunications ,02 engineering and technology ,business ,Protocol (object-oriented programming) ,Information Systems ,Computer network ,Shared resource - Published
- 2018
23. The Effect of Discourse Analysis Informed Instruction on Developing High School Learners Reading Comprehension
- Author
-
Mohammed, Hawa, primary
- Published
- 2020
- Full Text
- View/download PDF
24. An efficient speech recognition system for arm-disabled students based on isolated words
- Author
-
Ramzi Saifan, Khalid A. Darabkh, Saadeh Z. Sweidan, Sharhabeel H. Alnabelsi, Mohammed Hawa, and Laila Haddad
- Subjects
Voice activity detection ,General Computer Science ,Process (engineering) ,Computer science ,Speech recognition ,05 social sciences ,General Engineering ,050301 education ,Word error rate ,020206 networking & telecommunications ,02 engineering and technology ,Communications system ,Education ,Joystick ,0202 electrical engineering, electronic engineering, information engineering ,Mel-frequency cepstrum ,0503 education ,Real-time operating system ,Word (computer architecture) - Abstract
Over the previous decades, a need has emerged to empower human-machine communication systems, which are essential to not only perform actions, but also obtain information especially in education applications. Moreover, any communication system has to introduce an efficient and easy way for interaction with a minimum possible error rate. The keyboard, mouse, trackball, touch-screen, and joystick are all examples of tools which were built to provide mechanical human-to-machine interaction. However, a system with the ability to use oral speech, which is the natural form of communication between humans instead of mechanical communication systems, can be more practical for normal students and even a necessity for arm-disabled students who cannot use their arms to handle traditional education tools like pens and notebooks. In this paper, we present a speech recognition system that allows arm-disabled students to control computers by voice as a helping tool in the educational process. When a student speaks through a microphone, the speech is divided into isolated words which are compared with a predefined database of huge number of spoken words to find a match. After that, each recognized word is translated into its related tasks which will be performed by the computer like opening a teaching application or renaming a file. The speech recognition process discussed in this paper involves two separate approaches; the first approach is based on double thresholds voice activity detection and improved Mel-frequency cepstral coefficients (MFCC), while the second approach is based on discrete wavelet transform along with modified MFCC algorithm. Utilizing the best values for all parameters in just mentioned techniques, our proposed system achieved a recognition rate of 98.7% using the first approach, and 98.86% using the second approach of which is better in ratio than the first one but slower in processing which is a critical point for a real time system. Both proposed approaches were compared with other relevant approaches and their recognition rates were noticeably higher.
- Published
- 2017
25. TCP-CLD: Cross-Layer Design for Improving TCP Performance Over Cognitive Radio Networks
- Author
-
Iyad F. Jafar, Safaa Ali Al-Sarayrah, Khalid A. Darabkh, Mohammed Hawa, Raed T. Al-Zubi, and Sharhabeel H. Alnabelsi
- Subjects
Cognitive radio ,Computer Networks and Communications ,Hardware and Architecture ,business.industry ,Computer science ,Signal Processing ,Cross layer design ,Media Technology ,Electrical and Electronic Engineering ,business ,Computer network - Published
- 2020
26. Adaptive approach to restraining content pollution in peer-to-peer networks
- Author
-
Khalid A. Darabkh, Ghazi M. Al-Sukkar, Mohammed Hawa, and Raed T. Al-Zubi
- Subjects
Content validation ,Pollution ,Computer Networks and Communications ,Computer science ,media_common.quotation_subject ,020206 networking & telecommunications ,02 engineering and technology ,Peer-to-peer ,computer.software_genre ,Computer security ,Theoretical Computer Science ,Collusion ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,020201 artificial intelligence & image processing ,computer ,Software ,Information Systems ,media_common - Abstract
Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected content in an attempt to disrupt the system and waste network resources. When faced by such phenomenon, regular peers get discouraged from participating in the P2P network as they find less value in the system. In this work, we investigate the amount of resources required to restrain pollution attacks by means of content validation. We introduce multiple adaptive techniques that can minimize the spread of polluted content, while at the same time reduce the cost of content validation for peers participating in the network. Furthermore, the proposed pollution-restraint techniques are resistant to collusion from malicious peers, and they do not contribute to excessive communication overhead in the P2P network.
- Published
- 2016
27. On Using Spectrum History to Manage Opportunistic Access in Cognitive Radio Networks
- Author
-
Iyad F. Jafar, Mohammed Hawa, Dia I. Abu-Al-Nadi, and Othman M.-K. Alsmadi
- Subjects
General Computer Science ,Computer science ,Controller (computing) ,Cognitive radio networks ,Throughput ,02 engineering and technology ,Interference (wave propagation) ,Frequency allocation ,Control channel ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Radio resource management ,business.industry ,spectrum management ,General Engineering ,020206 networking & telecommunications ,frequency switching cost ,Cognitive radio ,decentralized ,020201 artificial intelligence & image processing ,history ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,business ,lcsh:TK1-9971 ,Communication channel ,Computer network - Abstract
Cognitive radio networks (CRNs) open up the underutilized parts of the licensed spectrum for secondary reuse, so long as this secondary access does not cause harmful interference to the licensed users. Being able to run CRNs in a completely decentralized manner, as opposed to centralized operation, can be quite advantageous, because it avoids the complexity and single point-of-failure issues that arise from the presence of a central controller, and also eliminates the difficult step of establishing and maintaining a common control channel, which can suffer from saturation and malicious attacks. To that end, we propose in this paper a novel decentralized spectrum allocation technique for CRNs that not only provides great performance in terms of high throughput, excellent fairness, and minimal interference between cognitive users but also provides very stable network operation, in which cognitive users do not have to switch their operating frequency quite regularly. This is achieved by systematically observing the history of the spectrum usage to determine the proper channel assignment in the CRN. Our proposed technique is intuitive, is completely decentralized, and allows for quick reaction to changes in the CRN, such as when the primary users licensed to use the spectrum are suddenly activated.
- Published
- 2016
28. Dynamic resource allocation using load estimation in distributed cognitive radio systems
- Author
-
Loay D. Khalaf, Mohammed Hawa, Jamal S. Rahhal, and Khalid A. Darabkh
- Subjects
Cognitive radio ,business.industry ,Computer science ,Distributed algorithm ,Wireless ,Cognition ,Throughput ,Electrical and Electronic Engineering ,business ,Interference (wave propagation) ,Cognitive network ,Spectrum management ,Computer network - Abstract
Cognitive radio is an emerging wireless technology that is envisaged as a solution to the spectrum scarcity issue. To improve spectrum utilization, cognitive (unlicensed) wireless users are assigned an opportunistic access to vacant channels on the condition they avoid interference with primary (licensed) users. In this paper we present an impressive design of a low complexity and high efficiency dynamic spectrum access technique for cognitive radio networks. This spectrum assignment algorithm does not require central controllers nor the pre-establishment and maintenance of common control channels. Yet, it can provide throughput and fairness levels that approach the performance of centralized systems. In addition, the proposed technique reacts extremely well to disturbances in the cognitive radio network configuration, including when primary users are activated, or when newcomer cognitive users join the network. Furthermore, we present in this work an analytical model that can be used to provide quick predictions of the performance of our proposed algorithm.
- Published
- 2015
29. Sensing Device Management for History-Based Spectrum Sharing in Cognitive Radio Networks
- Author
-
Fahed Jubair, Raed T. Al-Zubi, Ramzi Saifan, and Mohammed Hawa
- Subjects
Article Subject ,Computer Networks and Communications ,business.industry ,Computer science ,lcsh:T ,Detector ,020206 networking & telecommunications ,Throughput ,02 engineering and technology ,lcsh:Technology ,lcsh:Telecommunication ,Base station ,Cognitive radio ,lcsh:TK5101-6720 ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,Spectrum sharing ,Swap (computer programming) ,Information Systems ,Computer network - Abstract
A novel approach to managing a fully distributed cognitive radio network (CRN) is presented. This approach builds on the concept of history-based spectrum access, in which cognitive base stations (BSs) independently estimate the system load using history records and adaptively swap their occupied spectrum bands to ensure allocation fairness and high overall throughput. In addition, cognitive BSs monitor primary user (PU) behavior in order to avoid interfering with active PUs. In this work, we address two issues that afflict history-based access: the first is the high cost of the sensing devices needed at each cognitive BS to be able to independently draw conclusions about the status of the CRN and the second is the unreliability inherent in practical sensing hardware (such as energy detectors). Simulation results show that the proposed technique manages to solve the two abovementioned issues without any noticeable drop in performance and without sacrificing the distributed nature of the protocol.
- Published
- 2018
- Full Text
- View/download PDF
30. A New Image Steganographic Approach for Secure Communication Based on LSB Replacement Method
- Author
-
Khalid A. Darabkh, Raed T. Al-Zubi, Iyad F. Jafar, and Mohammed Hawa
- Subjects
Steganography ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Cryptography ,Geometric shape ,Computer security ,computer.software_genre ,Computer Science Applications ,Scrambling ,Least significant bit ,Secure communication ,Control and Systems Engineering ,The Internet ,Electrical and Electronic Engineering ,business ,computer ,Digital watermarking - Abstract
With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of current researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. Unlike cryptography that focuses on scrambling the secret message so that it cannot be understood, the main objective of steganography and watermarking is to communicate securely in such a way that the hidden data are not visible to the observer. In other words, it seeks for the imperceptibility of stego-images quality to an unintended party through embedding efficiently the secret message in a digital media such as image, video, or audio. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape that is constructed according to well-analyzed geometric equations. The dimensions of the geometric shape are determined pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR) and payload. The contribution of our approach was immensely impressive.DOI: http://dx.doi.org/10.5755/j01.itc.44.3.8949
- Published
- 2015
31. A novel clustering protocol for wireless sensor networks
- Author
-
Ala' F. Khalifeh, Ramzi Saifan, Wala's S. Al-Rawashdeh, Mohammed Hawa, and Khalid A. Darabkh
- Subjects
Hierarchy (mathematics) ,Computer science ,business.industry ,Node (networking) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,020206 networking & telecommunications ,02 engineering and technology ,0202 electrical engineering, electronic engineering, information engineering ,Cluster (physics) ,Overhead (computing) ,020201 artificial intelligence & image processing ,Cluster analysis ,business ,Wireless sensor network ,Protocol (object-oriented programming) ,Energy (signal processing) ,Computer network - Abstract
There are many existing clustering protocols that aim at making the sensor network stay functioning longer out of which Low-Energy Adaptive Clustering Hierarchy (LEACH) and Threshold-based LEACH (T-LEACH) protocols. T-LEACH protocol takes advantage of LEACH main deficiency, which is about having high control overhead. In other words, T-LEACH proposes that cluster heads do not have to turn over every round but rather every batch of rounds. Nodes will keep serving as cluster heads as long as their energy is higher than a threshold energy. This article imposes upon major drawbacks of T-LEACH and proposes a Modified Threshold-based Cluster Head Replacement (MT-CHR). In MT-CHR, a new probability of being a cluster head, for any node in any round, has been proposed which agrees fairly with the assumptions introduced in LEACH protocol.
- Published
- 2017
32. Prevalence of Pulmonary Tuberculosis and Associated Factors Among HIV Positive Patients Attending Antiretroviral Therapy Clinic at Arba Minch General Hospital, Southern Ethiopia
- Author
-
Mama, Mohammedaman, primary, Manilal, Aseer, additional, Tesfa, Haile, additional, Mohammed, Hawa, additional, and Erbo, Endeshaw, additional
- Published
- 2018
- Full Text
- View/download PDF
33. Packet Recycling and Delayed ACK for Improving the Performance of TCP over MANETs
- Author
-
Mohammed Hawa, Khalid A. Darabkh, Raed T. Al-Zubi, Marwan Krunz, and Ghazi M. Al-Sukkar
- Subjects
CUBIC TCP ,TCP Vegas ,TCP acceleration ,Computer science ,Transmission Control Protocol ,Retransmission ,Congestion window ,TCP tuning ,TCP delayed acknowledgment ,H-TCP ,TCP sequence prediction attack ,TCP congestion-avoidance algorithm ,law.invention ,TCP Friendly Rate Control ,TCP Westwood ,TCP Westwood plus ,Packet loss ,law ,TCP hole punching ,Zeta-TCP ,Electrical and Electronic Engineering ,business.industry ,Network packet ,Radio Link Protocol ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile ad hoc network ,Computer Science Applications ,TCP global synchronization ,HSTCP ,Compound TCP ,business ,BIC TCP ,Computer network ,TCP pacing - Abstract
Most of the schemes that were proposed to improve the performance of transmission control protocol (TCP) over mobile ad hoc networks (MANETs) are based on a feedback from the network, which can be expensive (require extra bandwidth) and unreliable. Moreover, most of these schemes consider only one cause of packet loss. They also resume operation based on the same stand-by parameters that might vary in the new route. Therefore, we propose two techniques for improving the performance of TCP over MANETs. The first one, called TCP with packet recycling (TCP-PR), allows the nodes to recycle the packets instead of dropping them after reaching the retransmission limit at the MAC layer. In the second technique, which is called TCP with adaptive delay window (TCP-ADW), the receiver delays sending TCP ACK for a certain time that is dynamically changed according to the congestion window and the trip time of the received packet. TCP-PR and TCP-ADW are simple, easy to implement, do not require network feedback, compatible with the standard TCP, and do not require distinguishing between the causes of packet loss. Our thorough simulations show that the integration of our two techniques improves the performance of TCP over MANETs.
- Published
- 2013
34. Markov-Based Distributed Approach for Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs
- Author
-
Mohammed Hawa, Raed T. Al-Zubi, Khalid A. Darabkh, and Ghazi M. Al-Sukkar
- Subjects
IEEE 802.22 ,General Computer Science ,Markov chain ,Computer science ,business.industry ,business ,Computer network - Published
- 2013
35. An OPNET simulation model for peer-to-peer networks
- Author
-
Mohammed Hawa
- Subjects
Engineering ,business.industry ,media_common.quotation_subject ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Peer-to-peer ,computer.software_genre ,Computer Graphics and Computer-Aided Design ,Variety (cybernetics) ,Free riding ,Incentive ,Resource (project management) ,File sharing ,Modeling and Simulation ,business ,computer ,Software ,Computer network ,Reputation ,media_common - Abstract
Peer-to-peer (P2P) traffic has increased rapidly over the past few years, with file sharing providing the main drive behind such traffic. Therefore, modeling P2P systems and studying their impact on the performance of the underlying network is a vital research topic. In this work we describe a flexible, efficient and easily expandable P2P simulation framework developed for the OPNET simulation package. The framework can be used to study a wide variety of issues regarding the packet-level and/or the flow-level performance of P2P systems, including the impact of cooperation incentives on file dissemination; mobility and quality of service (QoS) support in P2P distribution; and the effects of free-riding, resource pollution, and malicious attacks on P2P networks.
- Published
- 2013
36. Invasive weed optimization for model order reduction of linear MIMO systems
- Author
-
Jamal S. Rahhal, Dia I. Abu-Al-Nadi, Zaer S. Abo-Hammour, Othman M.-K. Alsmadi, and Mohammed Hawa
- Subjects
Model order reduction ,Work (thermodynamics) ,Engineering ,Mathematical optimization ,business.industry ,Multivariable calculus ,Applied Mathematics ,MIMO ,Linear model ,Electric power system ,Control theory ,Modeling and Simulation ,Modelling and Simulation ,Minification ,business ,Eigenvalues and eigenvectors - Abstract
In this work, a model order reduction (MOR) technique for a linear multivariable system is proposed using invasive weed optimization (IWO). This technique is applied with the combined advantages of retaining the dominant poles and the error minimization. The state space matrices of the reduced order system are chosen such that the dominant eigenvalues of the full order system are unchanged. The other system parameters are chosen using the invasive weed optimization with objective function to minimize the mean squared errors between the outputs of the full order system and the outputs of the reduced order model when the inputs are unit step. The proposed algorithm has been applied successfully, a 10th order Multiple-Input–Multiple-Output (MIMO) linear model for a practical power system was reduced to a 3rd order and compared with recently published work.
- Published
- 2013
- Full Text
- View/download PDF
37. Light-assisted A⁎ path planning
- Author
-
Mohammed Hawa
- Subjects
Mathematical optimization ,Artificial Intelligence ,Control and Systems Engineering ,Computer science ,Obstacle ,Path (graph theory) ,Process (computing) ,Robot ,Motion planning ,Electrical and Electronic Engineering ,Grid ,Algorithm - Abstract
This paper introduces a novel variant of the A^@? path planning algorithm, which we call Light-assisted A^@? (or LA^@? for short). The LA^@? algorithm expands less nodes than A^@? during the search process, especially in scenarios where there are complex-shaped obstacles in the path between the start and goal nodes. This is achieved using the concept of (virtual) light which identifies and demotes dead-end paths blocked by obstacles, thus ensuring that the search stays focused on promising paths. Three path planning problems are used to test the performance of LA^@?. These include path finding in a grid cluttered by randomly placed obstacles, robot navigation in a map containing multiple solid walls, and finally mazes. The results of these experiments show that LA^@? can achieve orders of magnitude improvement in performance over A^@?. In addition, LA^@? results in near-optimal solutions that are very close to the optimal path obtained by the conventional A^@? algorithm.
- Published
- 2013
38. Cell Search Synchronization under the Presence of Timing and Frequency Offsets in W-CDMA
- Author
-
Loay D. Khalaf, Mohammed Hawa, and Wisam K. Hussain
- Subjects
Cell search ,Computer Networks and Communications ,Computer science ,W-CDMA ,Clock drift ,Real-time computing ,Synchronization (computer science) ,Electronic engineering ,Electrical and Electronic Engineering ,Software - Published
- 2013
39. A dynamic cross-layer routing protocol for Mobile Ad hoc Networks
- Author
-
Waleed Tuffaha, Mohammed Hawa, Mohammad Qasem, and Sinan Taifour
- Subjects
Routing protocol ,Engineering ,Adaptive quality of service multi-hop routing ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Optimized Link State Routing Protocol ,Destination-Sequenced Distance Vector routing ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
A new cross-layer routing protocol, named Dynamic Packet Guidance (DPG), is introduced for Mobile Ad hoc Networks (MANETs). Simulation results show that DPG is quite useful for usage in dense networks of mobile nodes, with medium-to-high speeds, and low-to-medium load. In these scenarios, DPG provides a superior performance compared to several well-known ad hoc routing protocols. The low end-to-end delay and smaller overhead that DPG achieves in such scenarios positively impacts the scalability of MANETs and reduces the energy requirements of nodes in such networks. DPG also shows immunity to failing nodes, as it operates consistently almost independently of failing nodes up to a certain ratio.
- Published
- 2012
40. On enhancing reputation management using Peer-to-Peer interaction history
- Author
-
Mohammed Hawa, Loqman As-Sayid-Ahmad, and Loay D. Khalaf
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Download ,media_common.quotation_subject ,Peer-to-peer ,computer.software_genre ,Computer security ,Incentive ,File sharing ,Reputation system ,Server ,Scalability ,business ,computer ,Software ,Computer network ,Reputation ,media_common - Abstract
Cooperation incentive mechanisms are an essential ingredient to the success of Peer-to-Peer (P2P) systems as they restraint the phenomenon of free-riding. We introduce an enhancement on reputation-based cooperation incentives used by the eDonkey2000 (ED2K) P2P file sharing network. This enhancement, called History-based Reputation System (HRS), can achieve better detection and control of free-riders, and by doing so enhances the scalability and fairness of the P2P system. HRS does not need the help of dedicated servers and/or central authorities, thus avoiding a single-point of failure. In addition, simulation results show that HRS achieves higher average download rate and smaller average download time for altruistic peers in a file sharing P2P system.
- Published
- 2012
41. File size models for shared content over the BitTorrent Peer-to-Peer network
- Author
-
Mohammed Hawa, Jamal S. Rahhal, and Dia I. Abu-Al-Nadi
- Subjects
Computer Networks and Communications ,BitTorrent tracker ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,computer.file_format ,Shared resource ,Torrent file ,File size ,Self-certifying File System ,File sharing ,SSH File Transfer Protocol ,business ,computer ,Software ,File system fragmentation ,Computer network - Abstract
Peer-to-Peer (P2P) traffic has increased rapidly over the past few years, with file sharing providing the main drive behind such traffic. In this work we perform a measurement study of the content shared over the popular BitTorrent P2P file sharing network. We mathematically model the file size distributions of shared files after categorizing them into Audio, Video, Archive and CD image classes. For each of these categories we look into the most popular shared file formats and investigate their file size statistics. This provides an important milestone to building a realistic simulation framework for P2P systems, and for future analytical modeling of P2P networks.
- Published
- 2012
42. A DISTRIBUTED VARIABLE DELAY LINE FOR WIDEBAND BEAM-FORMERS
- Author
-
Loay D. Khalaf, Saliba Dabbagh, and Mohammed Hawa
- Subjects
Engineering ,Digital delay line ,Delay calculation ,CMOS ,business.industry ,Bandwidth (signal processing) ,Electronic engineering ,Delay line oscillator ,Wideband ,business ,Image resolution ,Electronic, Optical and Magnetic Materials ,Group delay and phase delay - Abstract
A fully integrated CMOS wideband distributed variable delay line for time array beam-formers is presented. The delay line works over a full difierential mode, and the delay cell function is based on difierential ampliflers with active inductive peaking loads. A delay resolution of 15ps is obtained with a maximum delay capability of 150ps. The designed active delay line provides 3 scanning angles with 8:6 - of spatial resolution. This delay line is applicable for a 4 channel beam-former with an operational bandwidth of 500MHz centered at 5GHz. Our active delay line consumes up to 352mW of power from a 2.5V supply. The circuit is simulated in standard 0.25"m BiCMOS process and occupies 252"m £ 123"m of silicon area.
- Published
- 2012
43. An improved image least significant bit replacement method
- Author
-
Iyad F. Jafar, Khalid A. Darabkh, Raed T. Al-Zubi, and Mohammed Hawa
- Subjects
Theoretical computer science ,Steganography ,Cover (telecommunications) ,Color image ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Process (computing) ,Geometric shape ,Computer security ,computer.software_genre ,Least significant bit ,The Internet ,business ,Digital watermarking ,computer - Abstract
With the development of internet technologies and communication services, message transmissions over the internet still have to face all kinds of security problems. Hence, how to protect secret messages during transmission becomes a challenging issue for most of the researchers. It is worth mentioning that many applications in computer science and other related fields rely on steganography and watermarking techniques to ensure information safety during communication. In this paper, we propose a new steganographic method to embed the secret data inside a cover image based on least-significant-bit (LSB) replacement method. The embedding process predominantly concentrates on distributing the secret message inside one share of a color image to appear like a 3D geometric shape. The dimensions of the geometric shape are variable pursuant to the size of secret message. Data distribution process makes our method to be of a great interest as of being so difficult for the hackers or intruders to reconstruct the shape from stego-images, thereby the security is improved. Furthermore, we compare the performance of our approach with two other relevant approaches in terms of peak signal-to-noise ratio (PSNR). The contribution of our approach was immensely impressive.
- Published
- 2014
44. Cooperative Energy Efficient Routing For Wireless Sensor Networks In Smart Grid Communications
- Author
-
Ghazi AL-Sukkar, Iyad Jafar, Khalid Darabkh, Raed Al-Zubi, and Mohammed Hawa
- Subjects
Sensor networks ,Smart Grid Communications ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Dynamic Address Allocation ,Computer Science::Networking and Internet Architecture ,Data-centric storage - Abstract
Smart Grids employ wireless sensor networks for their control and monitoring. Sensors are characterized by limitations in the processing power, energy supply and memory spaces, which require a particular attention on the design of routing and data management algorithms. Since most routing algorithms for sensor networks, focus on finding energy efficient paths to prolong the lifetime of sensor networks, the power of sensors on efficient paths depletes quickly, and consequently sensor networks become incapable of monitoring events from some parts of their target areas. In consequence, the design of routing protocols should consider not only energy efficiency paths, but also energy efficient algorithms in general. In this paper we propose an energy efficient routing protocol for wireless sensor networks without the support of any location information system. The reliability and the efficiency of this protocol have been demonstrated by simulation studies where we compare them to the legacy protocols. Our simulation results show that these algorithms scale well with network size and density., {"references":["V.C. Gungor, \"Multimedia Wireless Sensor Networks for Smart Grid\nApplications,\" in IEEE COMSOC MMTC E-Letter, vol. 6, no. 12, pp.9-\n11, 2011.","Emilio Ancillotti, Raffaele Bruno, and Marco Conti, \"The Role of the\nRPL Routing Protocol for Smart Grid Communications,\" IEEE\nCommunications Magazine, Vol.51, no.1, January 2013, pp. 75-83.","S. Shenker, S. Ratnasamy, B. Karp, R. Govindan, and D. Estrin. \"Datacentric\nstorage in sensornets,\" Proc. ACM SIGCOMM Workshop on Hot\nTopics In Networks, 2002.","S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S.\nShenker. \"GHT: a geographic hash table for data-centric storage,\"\nProceedings of the ACM Workshop on Sensor Networks and\nApplications, pp. 78--87, Atlanta, Georgia, USA:ACM, September 2002.","Rowstron and P. Druschel, \"Pastry: Scalable, distributed object location\nand routing for large-scale peer-to-peer systems,\" in Proceedings of the\nMiddleware, 2001.","Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott\nShenker. \"A Scalable Content-Addressable Network,\" In Proceedings of\nthe ACM SIGCOMM, 2001.","Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan.\n\"Chord: A Scalable Peer-topeer Lookup Service for Internet\nApplications,\" ACM SIGCOMM 2001, San Diego, CA, August 2001.","Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, and J. D.\nKubiatowicz, \"Tapestry: A resilient global-scale overlay for service\ndeployment,\" IEEE Journal on Selected Areas in communications, vol.\n22, no. 1, pp. 41-53, January 2004.","Karp and H. T. Kung. \"GPSR: greedy perimeter stateless routing for\nwireless networks,\" Proceedings of the 6th annual international\nconference on Mobile computing and networking, Boston,\nMassachusetts, United States, 2000, pages 243-254.\n[10] Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica,\n\"Geographic routing without location information,\" in ACM MobiCom,\n2003.\n[11] James Newsome and Dawn Song, \"Gem: graph embedding for routing\nand data-centric storage in sensor networks without geographic\ninformation,\" in SenSys -03: Proceedings of the 1st international\nconference on Embedded networked sensor systems, New York, NY,\nUSA, 2003, pp. 76-88, ACM Press.\n[12] \"FIPS 180-1, Secure Hash Standard.\" U.S. Department of\ncommerce/NIST, National Technical Information Service, Springfield,\nApr. 1995.\n[13] C. Perkins and E. Royer,\"Ad hoc on demand Distance Vector routing,\"\nin proceedings of the 2nd IEEE Workshop on Mobile Computing Systems\nand Applications: (WMCA-99), New Orleans, Louisiana, USA, February\n1999.\n[14] Network Simulator, http://www.isi.edu/nsnam/ns/.\n[15] N. Sarkar, and W. Lol, \"A study of MANET Routing Protocols: Joint\nNode Density, Packet Length and Mobility\", in Proceedings of ISCC '10\nThe IEEE symposium on Computers and Communications, Reccione,\nItaly, June 2010."]}
- Published
- 2013
- Full Text
- View/download PDF
45. Kenya and Somalia
- Author
-
Noor Mohammed, Hawa, primary
- Published
- 2015
- Full Text
- View/download PDF
46. Time to insulin initiation cannot be used in defining latent autoimmune diabetes in adults
- Author
-
Sinead, Brophy, Knud, Yderstraede, Didac, Mauricio, Stephen, Hunter, Mohammed, Hawa, Paolo, Pozzilli, Guntram, Schernthaner, Nanette, Schloot, Nanette, Schoot, Raffaella, Buzzetti, Helen, Davies, David, Leslie, and Rhys, Williams
- Subjects
Research design ,Adult ,medicine.medical_specialty ,Time Factors ,Endocrinology, Diabetes and Metabolism ,medicine.medical_treatment ,Internal medicine ,Diabetes mellitus ,Immunopathology ,Internal Medicine ,Medicine ,Humans ,Hypoglycemic Agents ,Insulin ,Pancreatic hormone ,Aged ,Autoantibodies ,Advanced and Specialized Nursing ,Autoimmune disease ,Type 1 diabetes ,business.industry ,Glutamate Decarboxylase ,Autoantibody ,Middle Aged ,medicine.disease ,Diabetes Mellitus, Type 1 ,Immunology ,business - Abstract
OBJECTIVE—Latent autoimmune diabetes in adults is type 1 diabetes presenting as non–insulin dependent diabetes. One feature of the selection criteria is time independent of insulin treatment. We examine the validity of this criterion. RESEARCH DESIGN AND METHODS—Patients were recruited in nine European centers, and clinicians reported on criteria for initiating insulin. All patients were tested for GAD antibodies (GADAs) in a central laboratory. We examined time to insulin treatment for GADA-positive patients in six participating centers. RESULTS—There was intercenter variation in the criteria used to initiate insulin. Median time to insulin was 16.15 months (interqartile range 6.7–25.5) in centers with GADA testing compared with 45.6 months (29.5–61.8) in centers without routine GADA testing (P < 0.002). CONCLUSION—Time to insulin should not be used to define patients with LADA because it is dependent on local clinical judgment and the use of laboratory tests for GADA.
- Published
- 2007
47. Vieterbi decoder algorithm using quantum computing
- Author
-
Dia I. Abu-Al-Nadi, Mohammed Hawa, and Jamal S. Rahhal
- Subjects
Quantum sort ,Theoretical computer science ,Search algorithm ,Quantum phase estimation algorithm ,Best-first search ,Quantum algorithm ,Quantum algorithm for linear systems of equations ,Algorithm ,Soft output Viterbi algorithm ,Mathematics ,Quantum computer - Abstract
Quantum computing promises a leap in performance over classical computing. Its computational power was revealed after the introduction of some quantum algorithms such as Grover's search algorithm. Many classical algorithms especially that deal with Error Correcting Codes are introduced to solve an exhaustive search problem. The quantum techniques promise an optimal search speed that is of special importance when the size of the searched domain is quite large. In this paper we devise the use of quantum search algorithm introduced by Grover to implement the viterbi algorithm (VA). Due to lack of resources and the nature of implementing quantum algorithms, only theoretical results are obtained. The use of quantum search algorithm showed that we can reduce the number of search computations exponentially. For example if the classical VA requires 262144 searching operations for a signalling length of 1024 intervals, the quantum algorithm will need only 512 searching operations when single search quantum viterbi algorithm (SSQVA) is used. And for the multi search quantum viterbi algorithm (MSQVA) it needs 16384 searching operations for the same signalling length.
- Published
- 2007
48. Efficient Way Of Web Development Using Python And Flask.
- Author
-
Aslam, Fankar Armash, Mohammed, Hawa Nabeel, and Lokhande, P. S.
- Subjects
WEB development ,COMPUTER networks ,WEB portals ,PYTHON programming language ,WEB-based user interfaces ,ROBUST control - Abstract
Web is the most frequently used networking aid which satisfies the requirements of all types of users; it provides a solution for any type of problem definition. While developing a web portal the appearance of web portal makes a development more critical. The good appearance of a web can easily attract more number of visitors which is a success of web portal. For designing and developing such well structured and with the good appearance of web we have to choose a proper technology. The technological needs of satisfying a good web portal can be fulfilled by "python" and "flask". [ABSTRACT FROM AUTHOR]
- Published
- 2015
49. Double-edged constitutional gains for Somali women.
- Author
-
Mohammed, Hawa Noor
- Subjects
SOMALI women ,CIVIL war ,SEX discrimination laws ,NATION building ,ISLAMIC law ,SOMALIAN politics & government, 1991- ,PREVENTION - Abstract
The article discusses the constitutional gains brought by the new Somali government in Somalis, particularly women. It says that the new government was optimistic in ending a long-term civil war which has existed since former President Mohamed Siad Barre stepped down in 1991. It states that the constitution offers provision against gender-based discrimination in women and ensure their involvement in nation-building based on the Islamic Sharia'h law.
- Published
- 2013
50. A measurement study of shared content on peer-to-peer networks
- Author
-
Mohammed Hawa
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.