In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreCognitive radio technology is used to improve spectrum efficiency by having the cognitive radios act as secondary users to access primary frequency bands when they are not currently being used. In general conditions, cognitive secondary users are mobile nodes powered by battery and consuming power is one of the most important problem that facing cognitive networks; therefore, the power consumption is considered as a main constraint. In this paper, we study the performance of cognitive radio networks considering the sensing parameters as well as power constraint. The power constraint is integrated into the objective function named power efficiency which is a combination of the main system parameters of the cognitive network. We prove the exi
... Show MoreVoice over Internet Protocol (VoIP) is important technology that’s rapidly growing in the wireless networks. The Quality of Service (QoS) and Capacity are two of the most important issues that still need to be researched on wireless VoIP. The main aim of this paper is to analysis the performance of the VoIP application in wireless networks, with respect to different transport layer protocols and audio codec. Two scenarios used in the simulation stage. In the first scenario VoIP with codec G.711 transmitted over User Datagram Protocol (UDP), Stream Control Transmission Protocol (SCTP), and Real-Time Transport Protocol (RTP). While, in the second scenario VoIP with codec G.726 transmitted over UDP, SCTP, and RTP protocols. Network simulator
... Show MorePlanning of electrical distribution networks is considered of highest priority at the present time in Iraq, due to the huge increase in electrical demand and expansions imposed on distribution networks as a result of the great and rapid urban development.
Distribution system planning simulates and studies the behavior of electrical distribution networks under different operating conditions. The study provide understanding of the existing system and to prepare a short term development plan or a long term plan used to guide system expansion and future investments needed for improved network performance.
The objective of this research is the planning of Al_Bayaa 11 kV distribution network in Baghdad city bas
... Show MoreIncivility in nursing education can negatively affect the academic achievement. As there is no tool in Arabic to assess incivility among nursing students, there is a need for a valid and reliable tool.
This study aimed to investigate the psychometric properties of the Arabic version of the Incivility in Nursing Education- Revised (INE-R) survey.
Th
Background: Titanium implant is widely used in dentistry because of its extraordinary biocompatibility and mechanical properties. To increase bone–implant connection and provide early loading after placement, implant is stored in different storage medium and treated with UV light. Both of them are applicable methods to increase the bioactivity of titanium and overcome the biological aging. This study was designed to assess the effect of vacuum storage method and air storage with and without UV light treated of Cp Ti implant mechanically and histologically. Materials and methods: Titanium screws were acid etched and prepared in four different modes using different storage methods (air or vacuum and, with or without UV treatment. The implan
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreTechnology developed at very rapid paces in the last decade of the twentieth century and what followed, especially communication technology, as the World Wide Web appeared in the mid-nineties of the last century, Facebook in 2004 and 2006, the mobile phone, 1993, 1994, and social networking sites. The other. These technological developments have had an impact on societies, whether among individuals in one country or among different peoples. The citizen in any part of the world has become a journalist who practices the work of a specialized or professional journalist, even if he does not know how to read and write, or has a low level of education, as he can now transmit events from wherever he is to the world, through his personal page, or v
... Show MoreIt reveals speech communication whether it is legible audible or visible on a comprehensive formula inhabited open language on the modalities for reporting cases of the source say, making communication cognitive processes, is not to produce arguments as it is about the generation of the content of communication, so the contact of any kind remains practice for the cognitive action by the language in which it operates as a way agreed to their units between the poles of communication circle in the framework of a certain socio-cultural context, and that becomes the basis of the text of the message external referrals, making it feasible for multiple readings in semantic dimensions and deliberative