An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive controller, to manage the clustering in the sensing area of the spike ISDN-IoT. Hence, an intelligent queuing model is introduced to manage the flow table buffer capacity of the spike ISDN-IoT network, such that the quality of service (QoS) of the whole network is improved. A modified training algorithm is introduced to train the PRSNN to adjust its weight and threshold. The simulation results demonstrate that the QoS is improved by (14.36%) when using the proposed model as compared with a convolutional neural network.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show MoreEmotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no
... Show MoreIn most Reinforced Concrete (RC) buildings, the cross-section size of rectangular columns that conventionally used in these structures is larger than the thickness of their partitions. Consequently, a part of the column is protruded out of the wall which has some architectural disadvantages. Reducing the column size by using high strength concrete will result in slender column, thus the stability problem may be occurred. The stability problem is difficult to be overcome with rectangular columns. This paper study the effectiveness of using new types of columns called Specially Shaped Reinforced Concrete (SSRC) columns. Besides, the use of SSRC columns provides many structural advantage
A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The
... Show MoreThe presence of construction wastes such as clay bricks, glass, wood, plastic, and others in large quantities causes serious environmental problems in the world. Where these wastes can be used to preserve the natural resources used in construction and reduce the impact of this problem on the environment, it also works to reduce the problem of high loads of concrete blocks. Clay bricks aggregate (AB) can be recycled as coarse aggregate and replaced with volumetric proportions of coarse aggregate by ( 5% and 10%), as well as the use of clay brick powder (PB) by replacing its weight of cement (5% and 10%) and reduced in the manufacture of concrete blocks (blocks). Four mixtures will be prepared and tested to learn how to re
... Show MoreThis paper focuses on Load distribution factors for horizontally curved composite concrete-steel girder bridges. The finite-element analysis software“SAP2000” is used to examine the key parameters that can influence the distribution factors for horizontally curved composite steel
girders. A parametric study is conducted to study the load distribution characteristics of such bridge system due to dead loading and AASHTO truck loading using finite elements method. The key parameters considered in this study are: span-to-radius of curvature ratio, span length, number of girders, girders spacing, number of lanes, and truck loading conditions. The results have shown that the curvature is the most critical factor which plays an important
In the case where a shallow foundation does not satisfy with design requirements alone, the addition of a pile may be suitable to improve the performance of the foundation design. The lack of in-situ data and the complexity of the issues caused by lagging in the research area of pile foundations are notable. In this study, different types of piles were used under the same geometric conditions to determine the load-settlement relationships with various sandy soil relative densities. The ultimate pile capacity for each selected pile is obtained from a modified California Bearing Ratio (CBR) machine to be suitable for axial pile loading. Based on the results, the values of Qu for close-ended square pile were increased by 15
... Show More