An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive controller, to manage the clustering in the sensing area of the spike ISDN-IoT. Hence, an intelligent queuing model is introduced to manage the flow table buffer capacity of the spike ISDN-IoT network, such that the quality of service (QoS) of the whole network is improved. A modified training algorithm is introduced to train the PRSNN to adjust its weight and threshold. The simulation results demonstrate that the QoS is improved by (14.36%) when using the proposed model as compared with a convolutional neural network.
Balance is considered one of the most important components of physical activity in individual and team sports because it allows proper motor response and performance accuracy. The problem of the research lies in the lack of model for motor balance tests in the field of sports that require different positions and movements for classifying, selecting, diagnosing, and comparing athletes. The importance of the research lies in designing a test for motor balance as a reference for specialists in the field of sports and sport sciences. The subjects were first year College of physical education and sport sciences students / Baghdad University 2016 – 2017. The data was collected and treated using proper statistical operations. The researchers con
... Show MoreResearch Summary
In The Name of Allah Most Gracious Most Merciful
The word injustice and its derivatives were repeated in the Holy Qur’an in several places, approximately (154) times. This is due to the severity of its danger, and that the most dangerous thing that our Islamic nation suffers from in our time is; It is injustice in all its forms and types, so we should all have an honest review of the sincere change in the right direction, and uncover cases of injustice and explain their causes and causes, and work to treat them and rid the wrongdoers of their injustice, and help them to correct their condition. To reveal their grievances and explain their causes and causes, and work to remedy them, and support them and mi
... Show MoreThis paper represents an experimental study on the application of smart control represented by the use of the fuzzy logic controller. Two-link flexible manipulators that are used in airspace and military applications are made of flexible materials characterized by low frequency and damping ratio. To solve this problem, this paper proposes the use of smart materials (piezoelectric transducers), where each link is bonded with a pair of piezoelectric transducers that act as a sensor and another as an actuator. As the arm vibrates because of the movement generated by the motor, this voltage is controlled by a regulator inside the LABVIEW® 2020 software and sends the output control voltage to the piezoelectric actuator. Experimental results
... Show MoreAbstract
Robust controller design requires a proper definition of uncertainty bounds. These uncertainty bounds are commonly selected randomly and conservatively for certain stability, without regard for controller performance. This issue becomes critically important for multivariable systems with high nonlinearities, as in Active Magnetic Bearings (AMB) System. Flexibility and advanced learning abilities of intelligent techniques make them appealing for uncertainty estimation. The aim of this paper is to describe the development of robust H2/H∞ controller for AMB based on intelligent estimation of uncertainty bounds using Adaptive Neuro Fuzzy Inference System (ANFIS). Simulatio
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show More<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show More