Preferred Language
Articles
/
QIauRYYBIXToZYALSoHt
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive controller, to manage the clustering in the sensing area of the spike ISDN-IoT. Hence, an intelligent queuing model is introduced to manage the flow table buffer capacity of the spike ISDN-IoT network, such that the quality of service (QoS) of the whole network is improved. A modified training algorithm is introduced to train the PRSNN to adjust its weight and threshold. The simulation results demonstrate that the QoS is improved by (14.36%) when using the proposed model as compared with a convolutional neural network.

Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2015
Journal Name
2015 Ieee International Circuits And Systems Symposium (icsys)
Investigating the impact of on-chip interconnection noise on Dynamic Thermal Management efficiency
...Show More Authors

Dynamic Thermal Management (DTM) emerged as a solution to address the reliability challenges with thermal hotspots and unbalanced temperatures. DTM efficiency is highly affected by the accuracy of the temperature information presented to the DTM manager. This work aims to investigate the effect of inaccuracy caused by the deep sub-micron (DSM) noise during the transmission of temperature information to the manager on DTM efficiency. A simulation framework has been developed and results show up to 38% DTM performance degradation and 18% unattended cycles in emergency temperature under DSM noise. The finding highlights the importance of further research in providing reliable on-chip data transmission in DTM application.

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
On the Laser Micro Cutting: Experimentation and Mathematical Modeling based on RSM-CCD
...Show More Authors

The laser micro-cutting process is the most widely commonly applied machining process which can be applied to practically all metallic and non-metallic materials. While this had challenges in cutting quality criteria such as geometrical precision, surface quality and numerous others. This article investigates the laser micro-cutting of PEEK composite material using nano-fiber laser, due to their significant importunity and efficiency of laser in various manufacturing processes. Design of experiential tool based on Response Surface Methodology (RSM)-Central Composite Design (CCD) used to generate the statistical model. This method was employed to analysis the influence of parameters including laser speed,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Civil Engineering Journal
Structural Behavior of BubbleDeck Slab under Uniformly Distributed Load
...Show More Authors

In structural construction fields, reducing the overall self-weight of the structure is considered a primary objective and substantial challenge in the civil engineering field, particularly in earthquake-affected buildings and tall buildings. Different techniques were implemented to attain this goal; one of them is setting voids in a specific position through the structure, just like a voided slab or BubbleDeck slab. The main objective of this research is to study the structural behavior of BubbleDeck reinforced concrete slabs under the effect of static uniformly distributed load. The experimental program involved testing five fixed-end supported two-way solid and BubbleDeck slabs of dimensions 2500×2500×200 mm. The considered par

... Show More
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Dec 23 2025
Journal Name
Misan Journal For Physical Education Sciences
The impact of three models of training load on the development of the maximum strength for elite boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Fri May 19 2023
Journal Name
Revista Iberoamericana De PsicologÍa Del Ejercicio Y El Deporte
THE EFFECT OF SPECIAL EXERCISES ACCORDING TO A DESIGNED DEVICE IN DEVELOPING THE PERFORMANCE OF A KINETIC CHAIN ON THE BALANCE BEAM DEVICE
...Show More Authors

Preview PDF
Scopus
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
The Impact of Urban Solid Waste Management on Urban Environment
...Show More Authors

The growing population and the rising standard of living in cities as well as the increased commercial, industrial and agricultural activities around the world led to
massive production of waste containing different materials and one of them is the municipal solid waste (MSW), so there is a major problem facing the cities around the world about the waste, how to collect, transfer it and how to discard it. Because the accumulation of wastes, whether in the city alleys or in its squares and especially in its residential areas affect the health of their populations besides this situation will be a major indication of the deteriorating quality of life in the city, as hygiene considered a fundamental criterion for the city beauty as well

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact of Merger strategy on human resources management practices
...Show More Authors

The current research aims to test the impact of the strategy of merger (as an explanatory variable) in human resources management practices (as a response variable), and the importance of the subject being an important topic that mimics the Iraqi environment, where has seen many mergers that have not been addressed by former researchers in the field. In addition, the future prospects carry many mergers, and the problem of research was the lack of understanding among departments in how to manage the integration and deal with it, on the basis of scientific which reflected negatively on the practices of human resources management, and the research was based on two main hypotheses Six sub-hypotheses emerge to explore the correlation

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref