Preferred Language
Articles
/
QIauRYYBIXToZYALSoHt
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive controller, to manage the clustering in the sensing area of the spike ISDN-IoT. Hence, an intelligent queuing model is introduced to manage the flow table buffer capacity of the spike ISDN-IoT network, such that the quality of service (QoS) of the whole network is improved. A modified training algorithm is introduced to train the PRSNN to adjust its weight and threshold. The simulation results demonstrate that the QoS is improved by (14.36%) when using the proposed model as compared with a convolutional neural network.

Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Sep 20 2018
Journal Name
Www.intechopen.com
Internet of Things (IoT) for Automated and Smart Applications
...Show More Authors

Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader u

... Show More
View Publication
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Jan 25 2018
Journal Name
International Journal Of Current Engineering And Technology
Model-Based Design of Piezoelectric Patches used to Repair Damaged Beams under Static Load
...Show More Authors

Static loads exposing to mechanical components can cause cracks, which are lead to form stress concentration regions causing the failure of structure. Generally, from 80% to 90% of structure failure is due to initiation of the cracks. Therefore, it is necessary to repair the crack and reduce its effect on the structure where the effect of the crack is modelled as an additional flexibility to the structure. In the last few years, piezoelectric materials have been considered as one of the most favourable repairing techniques. The piezoelectric material converts the applied voltage on it to a bending moment to counter the bending moment caused by the external load on the beam at the crack location. In this study, the design of the piez

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
The Study of Traffic on The Roads The Governorate Of Karbala
...Show More Authors

The study of traffic on the roads the governorate of Karbala, Where is the study of traffic on the roads measure is necessary to determine the extent of the road and highlighting the importance of its role in the transfer of individuals from original to destination as well as the importance of the region that attracted its movement. This research aims to analyze the traffic in the governorate of Karbala through the study and analysis of surveys of traffic that were made in the governorate. Based on this analysis, it has been reached to identify volumes of the traffic and its density and how the roads are efficient and accommodating these volumes, the results of the traffic survey of the studied roads in the area of the study have shown t

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Load Effect on Wall Attachment Fluidics Amplifier Performance
...Show More Authors

An experimental work has been conducted on wall attachment fluidics amplifiers, one of them to study the effect of output pressure or load on the amplifier performance. The output load has been simulated as a piston connected to the device output and the piston can be loaded accordingly. The results shows that the output volume flow rate increases as the supply pressure increases under different load and the output pressure remains constant as the supply pressure increases under constant load.

View Publication Preview PDF
Publication Date
Tue Jan 31 2017
Journal Name
Journal Of Engineering
Behavior of Reinforced Concrete Columns Subjected to Axial Load and Cyclic Lateral Load
...Show More Authors

Columns subjected to pure axial load rarely exist in practice. Reinforced concrete columns are usually subjected to combination of axial and lateral actions and  deformations, caused by  spatially‐complex loading patterns as during earthquakes causes lateral deflection that in turn affects the horizontal stiffness. In this study, a numerical model was developed in threedimensional nonlinear finite element and then validated against experimental results reported in the literatures,
to investigate the behavior of conventionally RC columns subjected to axial load and  . lateral reversal cyclic loading. To achieve this goal, numerical analysis was conducted by using finite element program ABAQUS/Explicit. The variables co

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 20 2022
Journal Name
2022 International Conference On Computer And Applications (icca)
IoT E-health System for Cardiac Telemonitoring
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Development of Bridges Maintenance Management System based on Geographic Information System Techniques (Case study: AlMuthanna \ Iraq)
...Show More Authors

A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Apr 27 2019
Journal Name
Civil Engineering Journal
Characteristics of Traffic Accidents in Baghdad
...Show More Authors

Road traffic accidents (RTAs) are events that suddenly, inadvertently and unexpectedly occur under unforeseen circumstances that involve at least one moving vehicle and result in one or more road users being killed or injured. Unfortunately, Iraqi governorates suffer from higher rates of traffic accident casualties compared with the rates of casualties from terrorist attacks; this situation reveals a serious and growing problem. Road traffic accidents are not easy to eradicate. However, their prevalence can be reduced to the barest minimum via periodic assessments of traffic accident characteristics and the most important aspects for road authorities to consider when designing and evaluating the performance of a road to improve traf

... Show More
View Publication Preview PDF
Crossref (9)
Crossref