Transport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
This experimental study demonstrates the gable-reinforced concrete beams’ behavior with several number of openings (six and eight) and posts’ inclination, aimed to find the strength reduction in this type of beam. The major results found are: for the openings extending over similar beam length it is better to increase the number of posts (openings),
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreTwo of the main advantages of segmental construction are economics, as well as the rapid construction technique. One of the forms of segmental construction, for structural elements, is the segmental beams that built-in short sections, which referred to segments. This research aims to exhibit a new technique for the fabrication of short-span segmental beams from wedge-shaped concrete segments and carbon fiber reinforced polymers (CFRP) in laminate form. The experimental campaign included eight short-span segmental beams. In this study, two selected parameters were considered. These parameters are; the number of layers of CFRP laminates and the adhesive material that used to bond segments to each other, forming short-span segmental be
... Show MoreGlobal Navigation Satellite System (GNSS) is considered to be one of the most crucial tools for different applications, i.e. transportation, geographic information systems, mobile satellite communications, and others. Without a doubt, the GNSS has been widely employed for different scientific applications, such as land surveying, mapping, and precise monitoring for huge structures, etc. Thus, an intense competitive has appeared between companies which produce geodetic GNSS hardware devices to meet all the requirements of GNSS communities. This study aims to assess the performance of different GNSS receivers to provide reliable positions. In this study, three different receivers, which are produced by different manufacturers, were fi
... Show MoreCopper doped Zinc oxide and (n-ZnO / p-Si and n-ZnO: Cu / p-Si) thin films thru thickness (400±20) nm were deposited by thermal evaporation technique onto two substrates. The influence of different Cu percentages (1%,3% and 5%) on ZnO thin film besides hetero junction (ZnO / Si) characteristics were investigated, with X-ray diffractions examination supports ZnO films were poly crystal then hexagonal structural per crystallite size increase from (22.34 to 28.09) nm with increasing Cu ratio. The optical properties display exceptional optically absorptive for 5% Cu dopant with reduced for optically gaps since 3.1 toward 2.7 eV. Hall Effect measurements presented with all films prepared pure and doped have n-types conductive, with a ma
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show More
