Software-Defined Networking (SDN) has evolved network management by detaching the control plane from the data forwarding plane, resulting in unparalleled flexibility and efficiency in network administration. However, the heterogeneity of traffic in SDN presents issues in achieving Quality of Service (QoS) demands and efficiently managing network resources. SDN traffic flows are often divided into elephant flows (EFs) and mice flows (MFs). EFs, which are distinguished by their huge packet sizes and long durations, account for a small amount of total traffic but require disproportionate network resources, thus causing congestion and delays for smaller MFs. MFs, on the other hand, have a short lifetime and are latency-sensitive, but they account for the vast bulk of traffic in data center networks. The incorrect use of network resources by EFs frequently disturbs the performance of MFs. To meet these issues, precise classification of network traffic has become crucial. This classification enables traffic-aware routing techniques. This paper offers a novel model for classifying SDN traffic into MF and EF using a spike neural network. Once identified, traffic is routed based on the classification results. For MF, the model uses the Dijkstra algorithm. For EF, the Widest Dijkstra algorithm is used. This model solves the difficulties of traffic heterogeneity in SDNs by integrating advanced classification techniques and strategic routing algorithms. It enables desirable resource allocation, eliminates congestion, and increases network performance and dependability. The models used have proven their efficiency by outperforming the traditional Software Defined Network and other algorithms in terms of: throughput by 60%, and 20%, bandwidth utilization by 5%, and 7%, packet loss by 50%, and latency by 60%, respectively.
Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreIn this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show MoreDifferent ANN architectures of MLP have been trained by BP and used to analyze Landsat TM images. Two different approaches have been applied for training: an ordinary approach (for one hidden layer M-H1-L & two hidden layers M-H1-H2-L) and one-against-all strategy (for one hidden layer (M-H1-1)xL, & two hidden layers (M-H1-H2-1)xL). Classification accuracy up to 90% has been achieved using one-against-all strategy with two hidden layers architecture. The performance of one-against-all approach is slightly better than the ordinary approach
Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreActive Learning And Creative Thinking
The work in this paper involves the planning, design and implementation of a mobile learning system called Nahrain Mobile Learning System (NMLS). This system provides complete teaching resources, which can be accessed by the students, instructors and administrators through the mobile phones. It presents a viable alternative to Electronic learning. It focuses on the mobility and flexibility of the learning practice, and emphasizes the interaction between the learner and learning content. System users are categorized into three categories: administrators, instructors and students. Different learning activities can be carried out throughout the system, offering necessary communication tools to allow the users to communicate with each other
... Show MoreThere is no doubt that teachers are the leaders of positive changing in community where they directed the students and build their brains. In our current generation that characterized by accelerated technological development that communication changes, economic and politics, needs from the teacher an active leadership skills that match with the soul of our generation and contribute in confrontation the current challenges and the future challenges in the form that lead to create a conscious generation where they will be a basic brick for the future community where the listeners looking forward the education where they support the continuity communication of develop process, economy, scientifically and in all life fields. In our study we take
... Show More<span lang="EN-US">Iraqi people have been without energy for nearly two decades, even though their geographic position provides a high intensity of radiation appropriate for the construction of solar plants capable of producing significant quantities of electricity. Also, the annual sunny hours in Iraq are between 3,600 to 4,300 hours which makes it perfect to use the photovoltaics arrays to generate electricity with very high efficiency compared to many countries, especially in Europe. This paper shows the amount of electric energy generated by the meter square of crystalline silicon in the photovoltaic (PV) array that already installed in 18 states in Iraq for each month of the year. The results of the meter-square of PV arr
... Show More