An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive controller, to manage the clustering in the sensing area of the spike ISDN-IoT. Hence, an intelligent queuing model is introduced to manage the flow table buffer capacity of the spike ISDN-IoT network, such that the quality of service (QoS) of the whole network is improved. A modified training algorithm is introduced to train the PRSNN to adjust its weight and threshold. The simulation results demonstrate that the QoS is improved by (14.36%) when using the proposed model as compared with a convolutional neural network.
Background: Nickel-titanium (NiTi) archwires have become increasingly popular because of their ability to release constant light forces, which are especially useful during initial alignment and leveling phase. The aim of the present study was to investigate and compare the load–deflection characteristics of four commercially available NiTi archwires. Materials and methods: 200 NiTi 0.014, 0.016, 0.018, 0.016x0.022 and 0.019x0.025-inch nickel–titanium archwires from four different manufacturers (3M, Ortho Technology, Jiscop and Astar) were tested. The load-deflection properties of these archwires were evaluated by a full arch bending test in both palatal and gingival directionsat 37°C temperature using a universal material t
... Show MoreReducing a structure’s self-weight is the main goal and a major challenge for most civil constructions, especially in tall buildings and earthquake-affected buildings. One of the most adopted techniques to reduce the self-weight of concrete structures is applying voids in certain positions through the structure, just like a voided slab or BubbleDeck slab. This research aims to study, experimentally and theoretically, the structural behavior of BubbleDeck reinforced concrete slabs under the effect of harmonic load. Tow-way BubbleDeck slab of 2500mm×2500m×200mm dimensions and uniformly distributed bubbles of 120mm diameter and 160mm spacing c/c was tested experimentally under the effect of harmonic load. Numerical analysis was als
... Show MoreRock engineers widely use the uniaxial compressive strength (UCS) of rocks in designing
surface and underground structures. The procedure for measuring this rock strength has been
standardized by both the International Society for Rock Mechanics (ISRM) and American Society
for Testing and Materials (ASTM), Akram and Bakar(2007).
In this paper, an experimental study was performed to correlate of Point Load Index ( Is(50))
and Pulse Wave Velocity (Vp) to the Unconfined Compressive Strength (UCS) of Rocks. The effect
of several parameters was studied. Point load test, Unconfined Compressive Strength (UCS) and
Pulse Wave Velocity (Vp) were used for testing several rock samples with different diameters.
The predicted e
Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MorePolymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room
... Show MoreIron–phthalocyanine (FePc) organic photoconductive detector was fabricated using pulsed laser deposition (PLD) technique to work in ultraviolet (UV) and visible regions. The organic semiconductor material (iron phthalocyanine) was deposited on n-type silicon wafer (Si) substrates at different thicknesses (100, 200 and 300) nm. FePc organic photoconductive detector has been improved by two methods: the first is to manufacture the detector on PSi substrates, and the second is by coating the detector with polyamide–nylon polymer to enhance the photoconductivity of the FePc detector. The current–voltage (I–V) characteristics, responsivity, photocurrent gain, response time and the quantum efficiency of the fabricated photoconduc
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show More