KE Sharquie, HR Al-Hamamy, AA Noaimi, AF Tahir, Journal of Cosmetics, Dermatological Sciences and Applications, 2012 - Cited by 2
Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz
... Show MoreSoftware-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an
... Show MoreBackground: Non-nutritive sucking habits are common in infants and toddlers. One of the most common non-nutritive sucking habits is pacifier; its prevalence varies from one population to another. This study was conducted to determine the prevalence of pacifier sucking habit among children aged 1-5 years old in Baghdad city and to assess its effect on the occlusion of primary dentition concerning posterior crossbite. Materials and methods: The study was carried out among 1222 children aged 1-5 years old, from which 50 children with continues pacifier sucking habit were chosen to be the study group, compared to 50 children without any sucking habit (control group) matching the study group in age and gender. Children were examined clinically t
... Show MoreBackground: The study aim was to evaluate thermocycling effect on microleakage of occlusal and cervical margins of MOD cavity filled with bulk filled composites in comparison to incrementally placed nanohybrid composite and to evaluate the difference in microleakage between enamel and dentin margins for the three materials groups. Materials and method: Forty eight maxillary first premolars were prepared with MOD cavities. Samples were divided into three groups of sixteen teeth according to material used: Grandio: Grandio. SDR: SDR +Grandio. X-tra: X-tra base + Grandio. Each group was subdivided into two according to be thermocycled or not. After 24 hrs immersion in 2% methylene blue, samples weresectioned and microleakage was estimated. Res
... Show Moret:
The most famous thing a person does is talk. He loves and hates, and continues with it confirming relationships, and with it, too, comes out of disbelief into faith. Marry a word and separate with a word. He reaches the top of the heavens with a kind word, with which he will gain the pleasure of God, and the Lord of a word that the servant speaks to which God writes with our pleasure or throws him on his face in the fire. Emotions are inflamed, the United Nations is intensified with a word, and relations between states and war continue with a word.
What comes out of a person’s mouth is a translator that expresses the repository of his conscience and reveals the place of his bed, for it is evidence of
... Show MoreThe issue of the prisoners' rights and the way of dealing with them is not just a minor or
primary issue according to the contemporary attitudes to deal with criminals, but it is a fatal
issue that goes with the development of life and comprehension of human rights. As the
criminal is considered as a human-being who can be reformed and qualified, according to the
aims of the contemporary social service the prisoner is regarded as an idle human source who
can be reformed, treated and qualified so as to make him participate to improve his family and
society in the end.
This study aims at reconstructing the prisons bases when applying the laws of the lowest
level of treatment through the research of oppositions, atti
In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.