Preferred Language
Articles
/
QIauRYYBIXToZYALSoHt
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive controller, to manage the clustering in the sensing area of the spike ISDN-IoT. Hence, an intelligent queuing model is introduced to manage the flow table buffer capacity of the spike ISDN-IoT network, such that the quality of service (QoS) of the whole network is improved. A modified training algorithm is introduced to train the PRSNN to adjust its weight and threshold. The simulation results demonstrate that the QoS is improved by (14.36%) when using the proposed model as compared with a convolutional neural network.

Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Analysis Based on Well Logging Data for Tight Carbonate Reservoir: The SADI Formation Case in Halfaya Oil Field
...Show More Authors

Carbonate reservoirs are an essential source of hydrocarbons worldwide, and their petrophysical properties play a crucial role in hydrocarbon production. Carbonate reservoirs' most critical petrophysical properties are porosity, permeability, and water saturation. A tight reservoir refers to a reservoir with low porosity and permeability, which means it is difficult for fluids to move from one side to another. This study's primary goal is to evaluate reservoir properties and lithological identification of the SADI Formation in the Halfaya oil field. It is considered one of Iraq's most significant oilfields, 35 km south of Amarah. The Sadi formation consists of four units: A, B1, B2, and B3. Sadi A was excluded as it was not filled with h

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Oct 25 2023
Journal Name
Journal Of Optics
Integrated gallium phosphide-waveguide polarization rotator based on rotating a horizontal slot by 45 degree for 700 nm wavelength
...Show More Authors

Polarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomenon in the waveguide. The simulation results demonstrate a polarization co

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The of Effect Instructional Design based on Kagan Structure In Generating Information Skills for First Intermediate Student’s In Mathematics
...Show More Authors

 

The aim of the research is to identify the effect of instructional design according to Kagan structure among the first intermediate school student’s, and how skills could help in generating information in mathematics. In accordance with the research objectives, the researcher has followed the experimental research method by adopting an experimental design with two equivalent groups of post-test to measure skills in generating information. Accordingly, the researcher raised two main null hypotheses: there were no statistically significant differences at the level of significance (0.05) between the average scores of the experimental group who studied the material according to Kagan structure and th

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 25 2023
Journal Name
Journal Of Optics
Integrated gallium phosphide-waveguide polarization rotator based on rotating a horizontal slot by 45 degree for 700 nm wavelength
...Show More Authors
Abstract<p>Polarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE<sub>0</sub>) mode to the fundamental transverse magnetic (TM<sub>0</sub>) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomeno</p> ... Show More
Scopus Clarivate Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Computer Methods And Programs In Biomedicine
A hybrid approach based on multiple Eigenvalues selection (MES) for the automated grading of a brain tumor using MRI
...Show More Authors

View Publication
Scopus (37)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
"Acquired organizational immune and its impact on the application of knowledge management strategies" Analytical study of the opinions of a sample of Lecturer staff at the Technical College of Engineering and the Technical Institute of Amara
...Show More Authors

             The present study aims to reveal the extent of the influence of the acquired organizational immune through its dimensions (organizational vaccination, organizational learning, organizational memory, and benchmarking) in the application of knowledge management strategies in its two dimensions (codification strategy, personalization strategy) as well as clarifying that influential relationship between the study variables Because of its importance in reducing resistance to change by responding to the requirements of the environment. A set of main and sub-hypotheses emerged from the study, which was formulated in view of the hypothesis scheme of the study, and i

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Multi-pages structure for Six Sigma performance matrix based on the technical characteristics of balanced performance and methodology Al-Sigma for measuring corporate performance: Suggestion vision
...Show More Authors

Accelerates operating managements in the facilities contemporary business environment toward redefining processes and strategies that you need to perform tasks of guaranteeing them continue in an environment performance dominated by economic globalization and the circumstances of uncertainty attempt the creation of a new structure through multiple pages seek to improve profitability and sustainable growth in performance in a climatefocuses on the development of institutional processes, reduce costs and achieve customer satisfaction to meet their demands and expectations are constantly changing. The research was presented structural matrix performance combines methodology Alsigma in order to improve customer satisfaction significantly bet

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref