Performances of single and double basin solar-stills

AA Al-Karaghouli, WE Alnaser - Applied Energy, 2004 - Elsevier
Two solar stills (single basin and double decker) were fabricated and tested. Both have the
same basin area. The inner dimensions of each was 90× 50 cm (effective area 0.45 m2). For …

Mobile ad hoc network routing protocols: performance evaluation and assessment

MA Elsadig, YA Fadlalla - International Journal of Computing …, 2018 - journal.uob.edu.bh
Recently a great deal of attention has been paid to Mobile Ad Hoc Networks (MANETs) due
to their important roles in many different applications that include, but are not limited to: civil …

Comparative study and performance investigation of MANET routing protocols

B AL-Hasani, B Waheed - International Journal of Nonlinear …, 2022 - ijnaa.semnan.ac.ir
MANETs (Mobile Ad-Hoc Networks) are fast-developing networks that gaining popularity in
the recent period. They play an important part in a variety of applications, and as a result …

A balanced approach to eliminate packet length-based covert channels

MA Elsadig, YA Fadlalla - 2017 4th IEEE International …, 2017 - ieeexplore.ieee.org
When information is leaked covertly in a way that violate a system's security policy, a covert
channel does exist. A covert channel is a channel that is exploited for illicit information flow …

[PDF][PDF] Packet length covert channels crashed

MA Elsadig, YA Fadlalla - J Comput Sci Comput Math, 2018 - jcscm.net
Advanced developments in network security tools and techniques have inspired attackers to
find alternative ways to bypass them. A network covert channel is a wide-open door for …

Behavioral Analysis of Reactive Protocol of MANET

R Bajaj, G Bathla, L Pawar - 2021 2nd Global Conference for …, 2021 - ieeexplore.ieee.org
The field of communication is rapidly growing. It'sa digital age where everyone is connected
by any means of digital communication device with others. The Communication network can …

[PDF][PDF] An efficient approach to resolving packet length covert channels

MA Elsadig, YA Fadlalla - 6th International Conference on …, 2017 - researchgate.net
A covert channel is a communication channel to leak secret information in a way that
violates system security policy. It is an extremely dangerous, unnoticeable, ongoing, and …

[PDF][PDF] Simulation-based Comparison between Reactive and Proactive Routing Protocols

IM Mohamed, MA Khalleefah - Computer Reviews Journal, 2020 - researchgate.net
Mobile ad hoc networks (MANETs) are widely used in recent years due to its ease of
installation and configuration, and its success in a wide range of applications, such as …

[PDF][PDF] An Efficient Approach to Resolve Covert Channels.

MA Elsadig, YA Fadlalla - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
The competitive edge of many companies and public trust in government institutions can
often depend on the security of the information held in their systems. Breaches of that …

Analytical solution of the transients in induction motors due to asymmetrical terminal fault

M AKBABA - Electric machines and power systems, 1991 - Taylor & Francis
When supply to the induction motor is short circuited the energy stored in machine, causes
the machine to behave as a generator. This can result in very large transient negative torque …