Preferred Language
Articles
/
WRcR-40BVTCNdQwCYCvW
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve network congestion problems. Since AI technologies are able to extract relevant features from data and deal with huge amounts of data, the integration of communication networks with AI to solve the congestion problem appears promising, and the research requires exploration. This paper provides a review of how AI technologies can be used to solve the congestion problem in 4G and 5G networks. We examined previous studies addressing the problem of congestion in networks, such as congestion prediction, congestion control, congestion avoidance, and TCP development for congestion control. Finally, we discuss the future vision of using AI technologies in 4G and 5G networks to solve congestion problems and identify research issues that need further study.

View Publication
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Sep 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison of Shear Bond Strength of Sapphire Bracket Bonded to Zirconium Surface after Using Different Surface Conditioning Methods (In Vitro Study)
...Show More Authors

Background: The present study was carried out to compare shear bond strength of sapphire bracket bonded to zirconium surface after using different methods of surface conditioning and assessment of the adhesive remnant index. Materials and methods: The sample composed of 40 zirconium specimens divided into four groups; the first group was the control, the second group was conditioned by sandblast with aluminum oxide particle 50 μm, the third and fourth group was treated by (Nd: YAG) laser (1064nm)(0.888 Watt for 5 seconds) for the 1st laser group and (0.444 Watt for 10 seconds) for the 2nd laser group. All samples were coated by z-prime plus primer. A central incisor sapphire bracket was bonded to all samples with light cure adhesive res

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Techniques مجلة التقني
A STUDY OF SOME TECHNICAL AND ECONOMICAL PARAMETERS FOR MACHINERY UNIT (NEW HOLLAND &DISC PLOW) BY USING THREE DIFFERENT TILT ANGLES دراسة بعض المؤشرات الفنية والأقتصادية للوحدة الميكنية (الجرار نيوهولاند مع المحراث القرصي الثلاثي القلاب) بأستخدام زوايا ميل مختلفة للأقراص
...Show More Authors

Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
PRESS COVERAGE OF CRISES: (A Research Drawn from a Doctoral Thesis)
...Show More Authors

Media is one of the main and effective factors; and it is a tool of crisis management equipment. Media is one of the most dangerous, effective and decisive weapons in modern conflicts; a tool for making events and influencing their events and trends as a means of reporting as the enormous capabilities of media which help media to move very quickly, and cross borders; and overcome obstacles, through many means of audio, reading and visual. As its ability, moreover, to influence the psychological and intellectual control of communities, and behaviors.

Intelligent media is, then, used in crises management and coverage. Crises have been existed with the presence of man on Earth. Thei

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
A New Iterative Methods For a Family of Asymptotically Severe Mappings
...Show More Authors
Abstract<p>The aim of this paper is to introduce the concepts of asymptotically p-contractive and asymptotically severe accretive mappings. Also, we give an iterative methods (two step-three step) for finite family of asymptotically p-contractive and asymptotically severe accretive mappings to solve types of equations.</p>
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 21 2021
Journal Name
Journal Of Engineering Mathematics
Fluid inflow from a source on the base of a channel
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Exponential Function of a bounded Linear Operator on a Hilbert Space.
...Show More Authors

In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Clinical Evaluation of a Formulated Econazol Nitrate as A Topical Solution
...Show More Authors

Econazole nitrate (EN) is considered as the most effective agent for the treatment of all forms of dermatomycosis caused by dernatophytes. It was formulated as a topical solution in our laboratories. This study was designed to evaluate the effectiveness of Econazol Nitrate in the prepared formula and compared with that of commercial brand, Pevaryl®. A total of 104 patient suffering from dermatomycoses were involved in this investigation. Both formula were applied to the affected skin region in the morning and evening from week to 16 weeks with light massage until complete healing effect was achieved. The data revealed that the percentage of cured patient treated with the prepared formula and reference formula of Ecanozol Nitrate 1% so

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and

... Show More
View Publication Preview PDF
Crossref