Software-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they account for the vast bulk of traffic in data center networks. The incorrect use of network resources by EFs frequently disturbs the performance of MFs. To meet these issues, precise classification of network traffic has become crucial. This classification enables traffic-aware routing techniques. This paper offers a novel model for classifying SDN traffic into MF and EF using a spike neural network. Once identified, traffic is routed based on the classification results. For MF, the model uses the Dijkstra algorithm. For EF, the Widest Dijkstra algorithm is used. This model solves the difficulties of traffic heterogeneity in SDNs by integrating advanced classification techniques and strategic routing algorithms. It enables desirable resource allocation, eliminates congestion, and increases network performance and dependability. The models used have proven their efficiency by outperforming the traditional Software Defined Network and other algorithms in terms of: throughput by 60%, and 20%, bandwidth utilization by 5%, and 7%, packet loss by 50%, and latency by 60%, respectively.
Manual fruit picking is labor-intensive and can damage fruit. Fully mechanized picking is efficient, but it also risks fruit damage. Therefore, semi-automated tools are needed to improve bitter orange picking. This paper presents a smart manual picker designed to facilitate picking while predicting fruit maturity based on picking force as well as various chemical and physical parameters using machine learning (ML). The study methodology consists of five stages: (1) manufacturing the smart picker, (2) picking 50 bitter orange samples, (3) measuring the characteristics of the bitter oranges in the laboratory, (4) training different ML models, and (5) identifying the most accurate model for predicting fruit maturity. The results indicate that
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MorePurpose: Determining and identifying the relationships of smart strategic education systems and their potential effects on sustainable success in managing clouding electronic business networks according to green, economic and environmental logic based on vigilance and awareness of the strategic mind.
Design: Designing a hypothetical model that reveals the role and investigating audit and cloud electronic governance according to a philosophy that highlights smart strategic learning processes, identifying its assumptions in cloud spaces, choosing its tools, what it costs to devise expert minds, and strategic intelligence.
Methodology:
The COVID-19 pandemic has profoundly affected the healthcare sector and the productivity of medical staff and doctors. This study employs machine learning to analyze the post-COVID-19 impact on the productivity of medical staff and doctors across various specialties. A cross-sectional study was conducted on 960 participants from different specialties between June 1, 2022, and April 5, 2023. The study collected demographic data, including age, gender, and socioeconomic status, as well as information on participants' sleeping habits and any COVID-19 complications they experienced. The findings indicate a significant decline in the productivity of medical staff and doctors, with an average reduction of 23% during the post-COVID-19 period. T
... Show MoreThis study was conducted in College of Science \ Computer Science Department \ University of Baghdad to compare between automatic sorting and manual sorting, which is more efficient and accurate, as well as the use of artificial intelligence in automated sorting, which included artificial neural network, image processing, study of external characteristics, defects and impurities and physical characteristics; grading and sorting speed, and fruits weigh. the results shown value of impurities and defects. the highest value of the regression is 0.40 and the error-approximation algorithm has recorded the value 06-1 and weight fruits fruit recorded the highest value and was 138.20 g, Gradin
Sewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated. For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers propos
... Show MoreIt is important that real time stability in smart grids is ensured as the integration of renewables and the complexity of the systems grows. In this paper, we provide a solid architecture, which combines a Residual CNNLSTM deep neural network predictor, FPGA-accelerated Model Predictive Control (MPC), and SHAP-based explainability. The proposed method predicted with 99.8% accuracy using the Electrical grid Stability Simulated Dataset (UCI) and minimized the instability rates surpassing 85 percent in all operating conditions. Meeting real-time operating needs, FPGA deployment on a Xilinx Zynq UltraScale+ provided 3.1 ms latency and 5 times reduced energy consumption against CPU processing. By emphasizing bus voltage and frequency as major in
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More