Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia applications. To address this challenge, This paper proposes the Neural Control Exponential Weight of Priority Based Rate Control (NEWPBRC) algorithm for adjusting the node transmission rate and facilitate the problem of congestion occur in WMSNs. The proposed algorithm combines Neural Network Controller (NC) with the Exponential Weight of Priority Based Rate Control (EWPBRC) algorithms. The NC controller can calculate the appropriate weight parameter λ in the Exponential Weight (EW) algorithm for estimating the output transmission rate of the sink node, and then, on the basis of the priority of each child node, an appropriate transmission rate is assigned. The proposed algorithm can support four different traffic classes namely, Real Time traffic class (RT class); High priority, Non Real-Time traffic class (NRT1 class); Medium priority, Non Real-Time traffic class (NRT2 class); and Low priority,
Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r
... Show MoreThe traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreQuantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.
This research study experimentally the effect of air flow rate on humidification process
parameters. Experimental data are obtained from air conditioning study unit T110D. Results obtained
from experimental test, calculations and psychometrics software are discussed. The effect of air flow rate
on steam humidification process parameters as a part of air-conditioning processes can be explained
according to obtained results. Results of the steam humidification processes (1,2) with and without
preheating with 5A and 7.5A shows decreasing in dry bulb temperature, humidity ratio, and heat add to
moist air with increasing air flow rate, but humidification load, and total energy of moist air increase with
increasing air flo
The simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was
... Show MoreThe transformation of a physical system to mathematical base is very important due to analysis of the systems behavior. In this paper an electric power system is considered, we design mathematical model for the determination of the increase in operational cost of transmission line from Haditha Dam substation to Qa'im substation . We derived relations which the approximate distance for VARS transmission must satisfy with considering minimum losses in the system. MATLAB computer programming is used to obtain the numerical results. The developed mathematical model and the numerical results could be useful to electric power systems engineers
Evaluating treatment effect on interferon-alpha in female patients with systemic lupus erythematosus: a case-control study
The current study was designed to investigate the impact of the missense Single Nucleotide Polymorphism (SNP), Asn291Ser (c.872A>G: rs12470652), of LHR gene (Luteinizing hormone receptor gene) in peripheral blood samples of Iraqi infertile women diagnosed with premature ovarian failure (POF) and normosmic idiopathic hypogonadotropic hypogonadism(niHH, patients with normal sense of smell). Following the hormonal analysis, fifty women diagnosed with premature ovarian failure and fifty women diagnosed with normosmic idiopathic hypogonadotropic hypogonadism were included as patient groups, while fifty healthy fertile women were enrolled as a control group. The blood samples were obtained from patient and control groups at Kamal Al-Samarra
... Show MoreBackground: Chronic periodontitis (CP) is greatly prevalent condition of inflammatory behavior. Salivary biomarker total antioxidants capacity (T-AOC) status, may be related to both periodontal condition and oral hygiene. Aims of the study: To assess the level of salivary T-AOC of patients with chronic periodontitis in comparison to healthy control and to correlate between the level of this marker with the clinical periodontal parameters (plaque index (PLI), gingival index (GI), bleeding on probing (BOP), probing pocket depth (PPD), and clinical attachment level (CAL)). Materials and Methods: Ninety subjects of males and females with an age ranged between (35-55) years were participated in this study. Participants were divided into two grou
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show More