The migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to point utilization the key performance metrics for network with address allocation and router configuration supported by Open Shortest Path First (OSPF) routing protocol. In addition it compares dual-stack to the tunneling mechanism of IPv6 transition using OPNET. The results have shown that IPv6 network produces a higher in throughput, response time and Ethernet delay, but little difference in packet dropped, additionally the result in TCP delay, Point to point utilization shows small values compared to dual-stack networks. The worst performance is noted when 6 to 4 tunneling is used, tunneling network produces a higher delay than other scenarios.
... Show MoreThe present article studies the specific cultural features contained in phraseological units. The problem is approached through three different levels:
- The modern linguistic meaning.
- Lexical components of phraseological units.
- The first variables of linguistic units.
The paper emphasizes the gradual process of the cultural charge in the semantic structure of phraseological units.
Наша Статья посвящена вопросам анализа национ-ально - культурной сп
Solar collectors, in general, are utilized to convert the solar energy into heat energy, where it is employed to generate electricity. The non-concentrating solar collector with a circular shape was adopted in the present study. Ambient air is heated under a translucent roof where buoyant air is drawn from outside periphery towards the collector center (tower base). The present study is aimed to predict and visualize the thermal-hydrodynamic behavior for airflow under inclined roof of the solar air collector, SAC. Three-dimensional of the SAC model using the re-normalization group, RNG, k−ε turbulence viscus model is simulated. The simulation was carried out by using ANSYS-FLUENT 14.5. The simulation
... Show MoreThe research is an article that teaches some classes of fully stable Banach - Å modules. By using Unital algebra studies the properties and characterizations of all classes of fully stable Banach - Å modules. All the results are existing, and they've been listed to complete the requested information.
Increased interest in the subject of the image because of its great and growing link to the life of the individual and society and its impact on the overall political, economic and cultural conditions. This interest is no longer confined to the images of people or institutions, but has become beyond that to the images of countries and peoples and the impact on bilateral relations between them,
However, we find that the image of the Iraqi abroad remained vague and has not been scientifically recognized and the most that we can generalize are the features of the image of Arabs and Muslims abroad; and assume that the image of the Iraqi applies to them as the Iraqi is in the end an Arab or Muslim.
Based on this, the research
... Show MoreComputer modeling has been used to investing the Coulomb coupling parameter ?. The effects of the structure parameter K, grain charge Z, plasma density N, temperature dust grain Td, on the Coulomb coupling parameter had been studied. It was seen that the ? was increasing with increasing Z and N, and decrease with increasing K and T. Also the critical value of ? that the phase transfer of the plasma state from liquid to solid was studied.
Cloth simulation and animation has been the topic of research since the mid-80's in the field of computer graphics. Enforcing incompressible is very important in real time simulation. Although, there are great achievements in this regard, it still suffers from unnecessary time consumption in certain steps that is common in real time applications. This research develops a real-time cloth simulator for a virtual human character (VHC) with wearable clothing. This research achieves success in cloth simulation on the VHC through enhancing the position-based dynamics (PBD) framework by computing a series of positional constraints which implement constant densities. Also, the self-collision and collision wit
... Show MoreAbstract
In this paper presents two dimensional turbulent flow of different nanofluids and ribs configuration in a circular tube have been numerically investigation using FLUENT 6.3.26. Two samples of CuO and, ZnO nanoparticles with 2% v/v concentration and 40 nm as nanoparticle diameter combined with trapezoidalribs with aspect ratio of p/d=5.72 in a constant tube surface heat flux were conducted for simulation. The results showed that heat flow as Nusselt number for all cases raises with Reynolds number and volume fraction of nanofluid, likewise the results also reveal that ZnO with volume fractions of 2% in trapezoidal ribs offered highest Nusselt number at Reynolds number of Re= 30000.
Key
... Show MoreData compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p
... Show MoreBlockchain has garnered the most attention as the most important new technology that supports recent digital transactions via e-government. The most critical challenge for public e-government systems is reducing bureaucracy and increasing the efficiency and performance of administrative processes in these systems since blockchain technology can play a role in a decentralized environment and execute a high level of security transactions and transparency. So, the main objectives of this work are to survey different proposed models for e-government system architecture based on blockchain technology implementation and how these models are validated. This work studies and analyzes some research trends focused on blockchain
... Show MoreThe use analysis value chain such information in the provision as financial so information quality meet and satisfy the needs of users such information , particularly investors and lenders as the identification needs financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the
... Show More