The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to point utilization the key performance metrics for network with address allocation and router configuration supported by Open Shortest Path First (OSPF) routing protocol. In addition it compares dual-stack to the tunneling mechanism of IPv6 transition using OPNET. The results have shown that IPv6 network produces a higher in throughput, response time and Ethernet delay, but little difference in packet dropped, additionally the result in TCP delay, Point to point utilization shows small values compared to dual-stack networks. The worst performance is noted when 6 to 4 tunneling is used, tunneling network produces a higher delay than other scenarios.
This paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.
In this work, a novel technique to obtain an accurate solutions to nonlinear form by multi-step combination with Laplace-variational approach (MSLVIM) is introduced. Compared with the traditional approach for variational it overcome all difficulties and enable to provide us more an accurate solutions with extended of the convergence region as well as covering to larger intervals which providing us a continuous representation of approximate analytic solution and it give more better information of the solution over the whole time interval. This technique is more easier for obtaining the general Lagrange multiplier with reduces the time and calculations. It converges rapidly to exact formula with simply computable terms wit
... Show MoreA three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreBackground: Irrigation has a central role in endodontic treatment. Several irrigating solutions have the antimicrobial activity and actively kill bacteria and yeasts when introduced in direct contact with the microorganisms. The purpose of this study was to evaluate the antimicrobial effectiveness of Dandelion (Taraxacum officinale) root and leaf extracts as possible irrigant solutions, used during endodontic treatments, and both were compared to Sodium hypochlorite, Propolis and Ethyl alcohol. Materials and Method: Forty seven human extracted single rooted teeth were selected. The teeth were decoronated using a diamond disk to have a length of 15 mm ±1 mm and they were instrumented using the hybrid technique. All roots were sterilized
... Show MoreXXXX
An evaluation the performance of the irrigation system for the Al-Ishaqi irrigation project for the Eastern Canal was conducted to identify management strategies that can be used to improve the operation and performance of the irrigation system. The study area is located in Salah al-Din G.0overnorate, Iraq. The field work included determining the moisture content of the soil before and after irrigation, measuring the inflow of the field to find the depth of the applied water, field monitoring, and measuring the depth of the root zone for each irrigation process. Field measurements showed that the average efficiency of water application for the two fields (A, and B) are 59.81% and 38.6%, respectively. The results of the efficiency of
... Show MoreAbstract
The common types of movement disorders are ; dystonia which is a syndrome of repetitive muscle contractions. While , Huntington disease is autosomal dominant progressive neurodegenerative disorder, which is characterized by involuntary movements (“chorea”).
Tetrabenazine therapy has been shown to effectively control this movements compared with placebo.
Design the proper dosing approach for patients treated with tetrabenazine with genotype polymorphisms and their hepatic effect on patients.
A prospective case controlled study was carried on 50 patients whom divided into 2 groups :first group involved 25 patients who had cho
... Show More