https://journals.mesopotamian.press/index.php/BJN/issue/feed Babylonian Journal of Networking 2024-10-27T17:54:45+00:00 Open Journal Systems <p style="text-align: justify;">The Babylonian Journal of Networking (EISSN: 3006-5372) focuses on cutting-edge advancements in networking technologies. This specialized publication invites researchers to share high-quality contributions covering computer networks, wireless communication, network security, and the Internet of Things (IoT). Through rigorous review, it aims to disseminate innovative insights and foster collaboration in this dynamic field</p> https://journals.mesopotamian.press/index.php/BJN/article/view/433 A Review of Underwater Wireless Sensor Networks Deployment Techniques and Challenges 2024-06-24T12:10:49+00:00 Kadoke Marco marcokadoke@gmail.com Sonia Goyal soniagoyall@pbi.ac.in Ranjit Kaur ranjit24ucoee@pbi.ac.in <p>Underwater Wireless Sensor Networks (UWSNs) have become increasingly important due to their critical roles in marine life monitoring, communication, ocean data collection, sampling, and military security operations. The success of UWSNs largely depends on efficient node deployment techniques that ensure optimal coverage, connectivity, cost-effectiveness, network lifetime, and energy utilization. This paper presents a comprehensive review of various node deployment types and techniques specifically designed for UWSNs. It covers depth-adjustment, movement-assisted, self-movement, and soft-computing techniques, highlighting their advantages, limitations, and application scenarios. Each technique is evaluated based on key performance metrics such as network coverage, connectivity, energy consumption, network lifetime, and deployment cost. Additionally, the paper discusses the challenges and identifies open research directions in the field, providing valuable insights for researchers and practitioners in selecting appropriate node deployment techniques for UWSNs.</p> <p> </p> 2024-07-25T00:00:00+00:00 Copyright (c) 2024 Kadoke Marco, Sonia Goyal , Ranjit Kaur https://journals.mesopotamian.press/index.php/BJN/article/view/251 Evaluation of OFDM system in terms of PAPR and BER using PAPR Reduction Techniques : Windowing and Clipping 2024-01-14T08:01:33+00:00 Mounika Siluveru mounika.siluveru@gmail.com Dharavath Nanda dharavath.nandu81@gmail.com Madhavi Kesoju madhu_kesoju@yahoo.co.in <p>The issue of transferring signals in a non-intrusive and efficient manner is highly intriguing. Consequently, the utilisation of the Orthogonal Frequency Division Multiplexing (OFDM) transmission technology is employed due to its enhanced resilience against multipath fading and its ability to achieve better efficiency compared to alternative wireless communication methods. Although the PAPR issue offers certain benefits, it poses undesirable consequences for OFDM, leading to a significant decrease in data transmission rate. Consequently, the mitigation of peak-to-average power ratio (PAPR) issues leads to an improvement in the quality of service. The reduction of PAPR can be achieved by the implementation of clipping and windowing techniques. These approaches arrange the signal into discrete levels of similar magnitude and apply clipping to minimise the bit error rate (BER), resulting in a drop in PAPR. The proposed approach is implemented using the MATLAB software.</p> 2024-01-10T00:00:00+00:00 Copyright (c) 2024 Mounika Siluveru, Dharavath Nanda, Madhavi Kesoju https://journals.mesopotamian.press/index.php/BJN/article/view/516 Optimizing Energy Efficiency in 6G Communication Networks Based on Data Transmission Rate Allocation 2024-09-16T14:05:01+00:00 R. Mageswaran nithisha.j@gmail.com Jose P nithisha.j@gmail.com Nithisha J nithisha.j@gmail.com T. Rengaraj nithisha.j@gmail.com M. Neeladri nithisha.j@gmail.com R.Senthil Rama nithisha.j@gmail.com <p>To progress communication and sensing in recent years, the Sixth-Generation (6G) network was developed. To transform the technological landscape of model transmission networks we use the 6G network, and it also used to enhance the speed, decrease the latency and improve the connectivity of network. Yet, in the 6G infrastructure with these developments it has severe challenge, that is the 6G network does not negate the benefits of energy consumption associated with network. In 6G communication the sensing performance of the smart device only relay on the available power of the network, and in the 6G communication energy efficiency becomes crucial. To progress the energy efficiency of data transmission in 6G communication networks, we deployed a Data Transmission Rate Allocation (DTRA) method. Moreover, to progress the data transmission of efficient nodes we deploy a Residual Energy Cluster Head (RECH) method. In addition, to improve the reliability and speed in the 6G network we use Dynamic Multipath Routing Protocol (DMRP) method, and it also mitigate the channel defects. Atlast, in the 6G communication networks we certify QoS through optimizing the transmission rate of the user equipment through low energy consumption, and quality of channel by the use of DTRA method. Finally, in this paper we evaluate the metrices performance of the existing methods and proposed method, for instance: efficiency, energy consumption, network lifetime, and transmission speed. After evaluate the performance metrices the DTRA method enhance network lifetime and energy efficiency of 95.3% based on 6G communication networks.</p> <p>&nbsp;</p> 2024-09-15T00:00:00+00:00 Copyright (c) 2024 R. Mageswaran , Jose P, Nithisha J, T. Rengaraj , M. Neeladri , R.Senthil Rama https://journals.mesopotamian.press/index.php/BJN/article/view/424 Underwater Wireless Sensors Increase Routing Performance using Impact Efficient localization-based Routing protocols 2024-06-15T08:56:55+00:00 T. Kavitha kavithaecephd@gmail.com M. Venkatesan venkatesan5488@gmail.com S. Gopalakrishnan drsgk85@gmail.com S.Ravi Chand ravichandsankuru1@gmail.com M Gopianand mgopianand@gmail.com S. Abirami abiramisathyamoorthy56@gmail.com <p>The Underwater Wireless Sensor Network (UWSN) is an organization used to perform observing of errands over a particular region; it is furnished with shrewd sensors and vehicles that are adjusted to convey helpfully through wireless connections. Remote sensor networks are enormous scope networks comprised of modest, reduced sensors with immense scope energy and settling limit that might be utilized in different unpredictable circumstances under factor conditions. The use of UWSNs is growing daily due to their significant contribution to several applications, including underwater surveillance and search. Wireless sensor networks submerged in water confront unique challenges. Therefore, particular routing protocols are needed from source to destination; security concerns that should be taken into consideration by routing protocols must be addressed by many UWSN applications. The proposed routing protocols influencing IHELBRP (Impact High Efficient Localization-Based Routing Protocols) and the UWSN architectural perspective. Reviewing and examining steering conventions concerning energy consumption, packet delivery rate, and packet delivery rate is finished. The advantages and disadvantages of each steering convention are recorded. To shield the correspondence medium here, a rundown of safety needs is incorporated alongside an investigation of safety worries in UWSN.</p> 2024-06-03T00:00:00+00:00 Copyright (c) 2024 T. Kavitha, M. Venkatesan , S. Gopalakrishnan , S.Ravi Chand, M Gopianand, S. Abirami https://journals.mesopotamian.press/index.php/BJN/article/view/488 Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines 2024-08-25T10:18:12+00:00 Arvind Kumar Bhardwaj Arvind.qa1@gmail.com P.K. Dutta pkdutta@kol.amity.edu Pradeep Chintale chintale.pradeep@gmail.com <p>Integrating shift-left security practices and automated vulnerability detection in container images is imperative for modern software development, given the dynamics and vulnerability landscape. This crucial methodology emphasizes security from the initial stages of integration in container-based environments like Docker and Kubernetes. The paper examines containerization security challenges, including image vulnerabilities, insecure configurations, runtime risks, weak orchestration security, and supply chain weaknesses, while stressing compliance with regulatory rules. It explores how this automated approach leverages vulnerability detection methods integrated into Continuous Integration/Continuous Deployment (CI/CD) pipelines through static and dynamic analyses, vulnerability databases, and policy-enforcement mechanisms. Beyond identifying vulnerabilities in CI/CD pipelines, the paper outlines methods to avoid policy violations, mitigate vulnerable images, and prevent recurring practices. Importantly, it underscores the continuous enforcement and remediation of policies and security standards. Security teams must invest efforts in developing policies, automated executions, and remediation procedures, fostering cross-departmental collaboration. In essence, this proactive stance aims to enhance software security, reduce risks, and improve adherence in containerized ecosystems, making it an indispensable component of modern software development.</p> 2024-08-20T00:00:00+00:00 Copyright (c) 2024 Arvind Kumar Bhardwaj, P.K. Dutta, Pradeep Chintale https://journals.mesopotamian.press/index.php/BJN/article/view/379 Using Artificial Intelligence to Evaluating Detection of Cybersecurity Threats in Ad Hoc Networks 2024-05-05T16:51:54+00:00 Rasha Hameed Khudhur Al-Rubaye 213721418@ogr.altinbas.edu.tr AYÇA KURNAZ TÜRKBEN Ayca.turkben@altinbas.edu.tr <p>This paper is devoted to the use of AI managed to contribute to security of the MANETs (Mobile Ad-hoc Networks), decentralized and mobile wireless networks, that are fully dynamic in nature. The intention of the research is to audit the dangers of cyber and to spot the variety of cyber threats types, including Distributed Denial of Service (DDoS) attacks, malware intrusions, leakages or data breaches, or unauthorized access attempts, using AI-powered algorithms and models. The purpose is to obtain higher degree of veracity of defining and classifying these threats and as result puts more security and reliability to MANET networks. Anomaly detection addressed as a secondary line of defense specific for MANET hardware and network traffic. The monitoring method is needed here to find abnormal behavior that might anyhow signify the possible security flaws or the attacks of the MANET environments. This ultimate goal is penetrated with the timely detection Peculiarities, which makes possible to reinforce MANET security capabilities that require to be well-developed against cyber threats. Experimental results reveal a clear trend of Fleet Grid Algorithm Improvements along with Detection Accuracy (Digital Signals and Anomaly) by means of training AI models (CNN and RF) with algorithms like Random forest and Convolutional neural networks. The machine learning based algorithms often present remarkable results comprising efficiency in detecting and effectively categorizing different cyber threats existing such as DDoS attacks, malware infiltrations and attempted unauthorized access. This method of anomaly detection is able to accurately detect robot anomalies and malicious activities in network traffic in addition to we preventing system vulnerabilities or threats from occurring prematurely. Besides, the findings of this study wide relatively efficient AI-based cybersecurity systems for dynamic decentralized MANET systems, which are developed for street-view switching and path finding, self healing and self configuration.</p> 2024-04-30T00:00:00+00:00 Copyright (c) 2024 Rasha Hameed Khudhur Al-Rubaye , AYÇA KURNAZ TÜRKBEN https://journals.mesopotamian.press/index.php/BJN/article/view/464 Survey on Neural Networks in Networking: Applications and Advancements 2024-08-07T17:34:07+00:00 Jenan Ayad jinan.a.namuq@uotechnology.edu.iq <p>The integration of neural networks into networking has paved the way for substantial advancements in network performance, security, and management. This survey delves into the diverse applications of neural networks within the networking domain, highlighting their impact on traffic prediction, anomaly detection, network optimization, and security enhancements. By leveraging the inherent capabilities of neural networks to model complex and non-linear relationships, significant improvements in efficiency and reliability can be achieved. This survey provides a thorough examination of current methodologies, key advancements, and practical implementations, offering insights into the future potential of neural networks in the field of networking.</p> 2024-08-02T00:00:00+00:00 Copyright (c) 2024 Jenan Ayad https://journals.mesopotamian.press/index.php/BJN/article/view/315 Mining Utilities Itemsets based on social network 2024-03-09T06:25:27+00:00 Sara salman Qasim eng.lubna.m@gmail.com Lubna Mohammed Hasan eng.lubna.m@gmail.com <p>Mining utility item sets based on social network data involves extracting meaningful patterns and associations from user interactions. In this paper, the process begins by collecting and preprocessing data from platforms like Facebook, Twitter, or LinkedIn. Utility measures are defined based on frequency of occurrence, user engagement metrics, or other domain-specific criteria. Itemsets that meet certain thresholds are identified using techniques like frequent itemset mining or advanced algorithms like Apriori or FP-growth. Additional analyses, such as association rule mining, uncover relationships between different itemsets or user segments, providing valuable insights for personalized recommendations, targeted advertising, and decision-making processes.</p> <p>&nbsp;</p> 2024-03-03T00:00:00+00:00 Copyright (c) 2024 Sara salman Qasim, Lubna Mohammed Hasan https://journals.mesopotamian.press/index.php/BJN/article/view/445 Integrating Behavioral Analytics and Intrusion Detection Systems to Protect Critical Infrastructure and Smart Cities 2024-07-09T17:54:05+00:00 G. Amirthayogam amir.yogam@gmail.com N. Kumaran nkumaran@veltech.edu.in S. Gopalakrishnan drsgk85@gmail.com K.R.Aravind Brito krbritto1975@gmail.com S. RaviChand Shrutibhargava@sreenidhi.edu.in Shruti Bhargava Choubey Shrutibhargava@sreenidhi.edu.in <p>In an age notable by growing digitization and relatedness, protecting critical infrastructure and smart cities against cyber threats is a biggest obstacle. This abstract examines the combination of Behavioural Analytics (BA) and Intrusion Detection Systems (IDS) as a active and best plan to boost cybersecurity defences. Behavioural Analytics uses machine learning algorithms and statistical models to notice usual entities behaviour patterns inside networks, empowering the identification of anomalies that indicate possible security infringements. This approach is improved through modern techniques that includes Statistical Anomaly Detection, which measures divergence and Long Short-Term Memory (LSTM) networks, skilled at grabbing temporal dependencies in data flow of network pursuit. Cross-Event Correlation methodologies and approaches improve the abilities of IDS by finding similarity between disparate events, giving a broad aspect of possible threats across inter related systems. Entity Behaviour Analysis (EBA) enhance these works by building thorough behaviour profiles and allocating risk scores based on divergence, improving targeted response plans. Network-Based IDS (NIDS) lengthen defence by observing whole networks for unusual activities, while Cyber Threat Intelligence (CTI) devices gives findings into progressing threats, enabling defensive security scales. Convolutional Neural Networks (CNNs) plays a part in removing complicated attribute from network data, improving anomaly detection. The results shows enhancements in threat detection accuracy, with a drop in false positives by 30% and an rise in anomaly detection precision to 95%. The Sensor Data (Units) changes from 80 to 90 units over monitored time periods.</p> 2024-07-01T00:00:00+00:00 Copyright (c) 2024 G. Amirthayogam, N. Kumaran, S. Gopalakrishnan, K.R.Aravind Brito, S. RaviChand, Shruti Bhargava Choubey https://journals.mesopotamian.press/index.php/BJN/article/view/255 Advancements in Time Series-Based Detection Systems for Distributed Denial-of-Service (DDoS) Attacks: A Comprehensive Review 2024-01-21T04:45:36+00:00 Sara salman Qasim PT21289@student.uniten.edu.my Sarah Mohammed NSAIF 213720040@ogr.altinbas.edu.tr <p>Distributed denial-of-service assaults, often known as DDoS attacks, pose a significant danger to the stability and security of the internet, particularly in light of the increasing number of devices that are linked to the internet. Intelligent detection systems are absolutely necessary in order to lessen the impact of distributed denial of service assaults. In this study, a comprehensive overview of recent research on intelligent approaches, such as Machine Learning (ML), Deep Learning (DL), and Artificial Intelligence (AI), is presented. The review focuses on the application of these techniques in the detection of Distributed Denial of Service (DDoS) assaults. In addition to providing a taxonomy and conceptual framework for DDoS mitigation, the study places particular emphasis on the application of time series data analysis for the detection of distributed denial of service attacks. A number of different intelligent techniques are investigated in this paper. Some of these techniques include clustering, deep reinforcement learning, graph neural networks, support vector machines, and others. For the purpose of performance evaluation, real datasets are utilized, and prospective future research areas in this area are explored.</p> 2024-01-20T00:00:00+00:00 Copyright (c) 2024 Sara salman Qasim, Sarah Mohammed NSAIF https://journals.mesopotamian.press/index.php/BJN/article/view/519 Gait Recognition by Computing Fixed Body Parameters 2024-09-21T13:37:29+00:00 Kassim Mohammed Awad it@gmail.com Lamia Faris Tulaib it@gmail.com Hadeel M Saleh it@gmail.com <p>Biometrics is a very important science, especially in recent years. This science was used to identify people based on their physical and behavioral characteristics. Gaiting is a behavioral characteristic that arises from the feeling that a person close to us can be identified even from a distance simply by recognizing how the person walks. The main advantage of gait recognition is that they are hidden and unnoticed. People can be identified from a distance. This paper implement Using computing fixed Body Parameters in the gait recognition. Computing fixed Body Parameters techniques has the advantage of being less sensitive to gait variance. The data captured manually from 50 persons, and the system can identify about&nbsp;&nbsp; (50 )% from the number of persons.</p> 2024-09-20T00:00:00+00:00 Copyright (c) 2024 Kassim Mohammed Awad , Lamia Faris Tulaib , Hadeel M Saleh https://journals.mesopotamian.press/index.php/BJN/article/view/427 Secure Routing and Reliable Packets Transmission In MANET Using Fast Recursive Transfer Algorithm 2024-06-17T07:32:51+00:00 M.Sahaya Sheela hisheelu@gmail.com R. Suganthi drrsuganthiphd@gmail.com S. Gopalakrishnan drsgk85@gmail.com T. Karthikeyan karthik.rt@gmail.com K. Jeevana Jyothi jyothikale7@gmail.com K. Ramamoorthy krmoorthy@psnacet.edu.in <p>Mobile Ad-hoc Network (MANET) autonomous operation can be multi-hop it is the infrastructure-less wireless network.&nbsp; Security is one of the biggest challenges in Mobile Adhoc Network. The MANETs security there are considerations must be so that the routing protocol in order to protect the secure data transmission. In the routing and security that is an important aspect for in a MANETs, existing method routing protocol, however, is not enough to security requirements. The proposed method using Fast Recursive Transmission Algorithm (FRTA) used designed to maximize the data security, routing optimization, minimizing the impact of malicious attack using Collision Detection Avoid Algorithm (CDAA) activity over the MANET and select the best path. Table-driven routing protocols, also known as proactive routing protocols, mandate that every node on the network keep up-to-date routing data. To maintain consistent routing information for network nodes, these protocols propagate frequent updates to the routing table throughout the network, necessitating changes to the network topology. There's a lot of overhead from these upgrades. The suggested FRTA algorithm lowers node data loss rates and increases network energy efficiency. Table-driven routing protocols, also known as proactive routing protocols, mandate that every node on the network keep up-to-date routing data. To maintain consistent routing information for network nodes, these protocols propagate frequent updates to the routing table throughout the network, necessitating changes to the network topology. There's a lot of overhead from these upgrades. The suggested FRTA algorithm lowers node data loss rates and increases network energy efficiency. The proposed method shows high performance than other existing evaluations of the most advanced security and routing energy, end-to-end delay, packet transfer rate, packet loss</p> 2024-06-15T00:00:00+00:00 Copyright (c) 2024 M.Sahaya Sheela, R. Suganthi, S. Gopalakrishnan, T. Karthikeyan, K. Jeevana Jyothi, K. Ramamoorthy https://journals.mesopotamian.press/index.php/BJN/article/view/492 A Novel Deep Learning Approach for Detecting Types of Attacks in the NSL-KDD Dataset 2024-08-26T15:32:45+00:00 HADEEL M SALEH SALEEH hadealms89@gmail.com Hend Marouane hadealms89@gmail.com Ahmed Fakhfakh hadealms89@gmail.com <p>&nbsp;The growing prevalence of Internet intrusions poses significant threats to the security, privacy, and reliability of systems and networks. Denial-of-service (DoS) attacks are a cause for concern as they aim to disrupt access to network resources, posing major risks. Traditional intrusion detection systems (IDS) face challenges in detecting attacks because of the evolving nature of these attacks. Therefore, advanced techniques are necessary to accomplish accurate and timely detection. This study introduces a novel approach that combines Deep learning techniques, specifically the CNN algorithm, with Principal Component Analysis (PCA) and Singular Value Decomposition (SVD) for the purpose of feature selection. The effectiveness and efficiency of our method are shown by rigorous testing on DDoS datasets. We present a novel Fast Hyper Deep Learning Model that attains a remarkable accuracy of 99%, along with perfect recall and F1-measurement scores of 100%. This model surpasses existing methodologies by a significant margin. The NSL-KDD data set allows for achieving a level of precision of100%.</p> <p>&nbsp;</p> 2024-09-01T00:00:00+00:00 Copyright (c) 2024 HADEEL M SALEH SALEEH, Hend Marouane , Ahmed Fakhfakh https://journals.mesopotamian.press/index.php/BJN/article/view/407 Performance Analysis of Hybrid Optical OFDM Schemes in terms of PAPR, BER and Spectral Efficiency using Various PAPR Reduction Methods 2024-06-02T11:38:12+00:00 Karthik Kumar Vaigandla vkvaigandla@gmail.com Mounika Siluveru mounika.siluveru@gmail.com Nanda Dharavath dharavath.nandu81@gmail.com RadhaKrishna Karne krkece@cmritonline.ac.in <p>Orthogonal Frequency Division Multiplexing (OFDM) is an extremely important technique for transmitting data in both optical wireless and optical fiber communication. Optical wireless systems are limited to transmitting real and positive values to the optical transmitter, since they rely only on the intensity of a signal to convey information. Consequently, traditional OFDM is not suitable for direct implementation in optical systems. Various altered OFDM schemes have been examined to counteract multipath distortion, such as DC-biased optical OFDM (DCO-OFDM), asymmetrically clipped optical OFDM (ACO-OFDM), asymmetrically clipped DC biased optical OFDM (ADO-OFDM) and layered asymmetrically-clipped optical OFDM (LACO-OFDM) technique to improve the bit error rate (BER) performance and spectral efficiency of optical system. This article explores ways for reducing Peak-to-Average Power Ratio (PAPR). A mathematical model is formulated to account for clipping and Selective Mapping (SLM), as well as channel noise, in all of these approaches for received signal. LACO-OFDM has been determined to be a superior option when compared to other techniques. LACO-OFDM, a recently developed technique, demonstrates excellent performance in terms of PAPR, BER, and spectral efficiency. The simulation results demonstrate that the LACO-OFDM approach has greatly enhanced the spectral efficiency in comparison to previous approaches.</p> 2024-08-01T00:00:00+00:00 Copyright (c) 2024 Karthik Kumar Vaigandla, Mounika Siluveru, Nanda Dharavath, RadhaKrishna Karne https://journals.mesopotamian.press/index.php/BJN/article/view/473 Robust Color Image Encryption Using 3D Chaotic Maps and S-Box Algorithms 2024-08-13T17:18:17+00:00 Jenan Ayad jinan.a.namuq@uotechnology.edu.iq Mustafa A Jalil Z02shshm@uco.es <p>Chaos' key qualities, such as initial state sensitivity and unpredictability, make it an ideal contender for cryptography applications. This study presents an encryption scheme for efficient and secure image encryption. The encryption scheme includes two ciphering stages and a substitution stage. In this work, an algorithm for key generation has been proposed. The design of a Pseudo-random number generator that used for key generation is based on chaotic algorithms. The chaotic map will be utilised in encryption systems due to its high security. To evaluate the proposed PRNG randomness, NIST tests are used for these sequences. In the following subsection, security analysis of the proposed image encryption technique has been made to know the efficiency of the proposed technique. The statistical analysis now reaffirms that the technique is secure and efficient for and encrypting simple or complex images, be it in shades of black and white or, colorful. By a comparison with past chaotic investigations, demonstrating that our algorithm is competitive with earlier work.</p> 2024-08-05T00:00:00+00:00 Copyright (c) 2024 Jenan Ayad , Mustafa A Jalil https://journals.mesopotamian.press/index.php/BJN/article/view/317 Using a Fuzzy Approach as an Assessment Method to Extend the Lifespan of Wireless Sensor Networks using the LEACH Protocol 2024-03-12T09:05:53+00:00 Janan Farag Yonan jananfarag@gmail.com Ayser Hadi Oleiwi ayserhadi74@gmail.com <p>Wireless sensor network is the term used to describe a network where network nodes are wirelessly configured to collect data from the real world. Node sensors depend on finite energy sources, such as batteries, because of the wireless configuration they have. If the battery-operated sensor of the node is not charged, it will be unable to carry out its intended function. If a specific amount of nodes fail, the network will cease to function. Several energy-efficient protocols were developed for Wireless Sensor Networks (WSN), including the LEACH Protocol. The LEACH protocol demonstrates a single cluster-based protocol by dividing available sensor nodes into sets and interacting with each set individually. The shape of an energy can be altered by compressing or expanding it, based on the cluster's configuration. We are comparing the network lifespans of three distinct versions of the LEACH protocol that utilize fuzzy techniques for cluster selection with the lifespan of WSNs generated by a previous version of the protocol.</p> 2024-03-10T00:00:00+00:00 Copyright (c) 2024 Janan Farag Yonan, Ayser Hadi Oleiwi https://journals.mesopotamian.press/index.php/BJN/article/view/453 Mapping Web Service Characteristics to Queueing Theory Models for Performance Analysis 2024-07-23T08:59:49+00:00 Raed Abdulkareem Hasan Raed.isc.sa@ntu.edu.iq Omar Ibrahim Obaid alhamdanyomar23@gmail.com Ans Ibrahim Mahameed AlQassab Raed.isc.sa@ntu.edu.iq Husniyah Jasim Husniyah_hwj@ntu.edu.iq Saad Ahmed Dheyab Raed.isc.sa@ntu.edu.iq <p>The article presents a comprehensive analysis of mapping the characteristics of Web services to queueing theory models, specifically the M/M/1 queueing model. The authors aim to establish a theoretical foundation for modeling the performance of Web services and deriving response time formulae. The key points covered in the article are as follows: 1. Analyzing the characteristics of Web services: The article examines the six fundamental characteristics of queueing systems, including arrival patterns, service patterns, queue discipline, system capacity, and the number of servers, and maps them to the Web service environment. 2. Representation using Kendall's notation: The Web service characteristics are represented using Kendall's notation, resulting in the M/M/1/∞/FCFS model, where M denotes exponential distributions for arrival and service patterns, 1 represents a single server, ∞ represents infinite system capacity, and FCFS represents the first-come, first-served queue discipline. 3. Derivation of response time formulae: The article provides a detailed derivation of the response time formulae for the M/M/1 model using stochastic processes, Markov chains, and the birth-death process. The derivation incorporates steady-state conditions and results in a formula that calculates the probability of completing a request within a user-specified response time. 4. Practical applications: The derived response time formula can be used by service providers to determine the probability of completing user requests within specified Service Level Agreements (SLAs). By setting a threshold value (filter value), the service provider can select requests with a higher probability of completion for further processing. Overall, the article contributes to the understanding of Web service performance modeling by establishing a theoretical foundation based on queueing theory. The mapping of Web service characteristics to the M/M/1 model and the derivation of response time formulae provide valuable insights for service providers to analyze and optimize the performance of their Web services while adhering to SLAs</p> 2024-07-20T00:00:00+00:00 Copyright (c) 2024 Raed Abdulkareem Hasan, Omar Ibrahim Obaid, Ans Ibrahim Mahameed AlQassab, Husniyah Jasim , Saad Ahmed Dheyab https://journals.mesopotamian.press/index.php/BJN/article/view/278 A ELECTRIC VEHICLE BLOCKCHAIN: PROBLEMS AND OPPORTUNITIES 2024-02-07T15:34:27+00:00 sahar Mohammed yousifsahar4@uoanbar.edu.iq Thaaer kh.Asman yousifsahar4@uoanbar.edu.iq Hadeel M Salih yousifsahar4@uoanbar.edu.iq Alaa Mohammed Mahmood yousifsahar4@uoanbar.edu.iq <p>These days, we are observing a very rapid spread of the electric vehicle<br>industry. This means a significant increase in the data and energy exchanged between<br>these vehicles. The existing centralized approach is less secure and more vulnerable<br>to data destruction and manipulation by intruders. Therefore, it became necessary to<br>search for an alternative that provides excellent protection for this massive amount<br>of data and energy. Although blockchain technology and cryptocurrencies are closely<br>associated, they also have many other potential applications in fields including energy<br>and sustainability, the Internet of Things (IoT), smart cities, smart mobility, and<br>more. In the Internet of Vehicles (IoV) idea, blockchain can provide security for<br>electric vehicle (EV) transactions, enabling electricity trading to be carried out in<br>a decentralized, transparent, and secure manner. . This paper will explain the use of<br>blockchain in this field and how it can handle the trade of transmitted and received<br>energy between electric vehicles. The advantages of using blockchain with electric<br>cars and how it can secure the transactions of energy trading will be shown too. A<br>group of researchers in this field and the challenges that face this technology in energy<br>trading will be discussed too; the studies will be looked at, and recommendations for<br>investments and security will be made. Additionally, the future implications of various<br>blockchain technologies will be highlighted.</p> 2024-02-19T00:00:00+00:00 Copyright (c) 2024 sahar Mohammed, Thaaer kh.Asman, Hadeel M Salih, Alaa Mohammed Mahmood https://journals.mesopotamian.press/index.php/BJN/article/view/572 Protecting Communication Situations Using IPSec and IKE Essentials and Applications 2024-10-27T17:54:45+00:00 Arkan Mahmood Albayati it@gmail.com Faouzi Zarai it@gmail.com <p>Inside the bustle of the city, all kinds of sounds fill the air, which interfere with each other like vying musicians. The brilliant neon lights of colossally tall buildings pierce the night sky. This extraordinary glow blankets the city under them. A numbing troop for dull movement. In firework like succession, the pong of grilling food on road side combinations with the clouds of gaseous situations. This all is a sympathetic of over total from smell saffron that lingers sufficiently long later. For all this chaos, there's an unique energy that flows through the city. It's a tenacious heartbeat that instincts things into night.</p> <p>&nbsp;</p> 2024-10-19T00:00:00+00:00 Copyright (c) 2024 Arkan Mahmood Albayati , Faouzi Zarai