Preferred Language
Articles
/
ZRe4UJEBVTCNdQwCt5Qi
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and forwarding planes. So, due to the rapid increase in the number of applications, websites, storage space, and some of the network resources are being underutilized due to static routing mechanisms. To overcome these limitations, a Software Defined Network based Openflow Data Center network architecture is used to obtain better performance parameters and implementing traffic load balancing function. The load balancing distributes the traffic requests over the connected servers, to diminish network congestions, and reduce underutilization problem of servers. As a result, SDN is developed to afford more effective configuration, enhanced performance, and more flexibility to deal with huge network designs.

Publication Date
Sat Sep 01 2012
Journal Name
2012 8th International Conference On Wireless Communications, Networking And Mobile Computing
Performance Evaluation of Location Management in GSM Networks
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
The effectiveness of balance in building formal relationships for media evidence: ساهرة عبد الواحد حسن
...Show More Authors

The media guide is a small-sized printed medium, whose importance is highlighted through the specific information it carriesThe task of the guide lies in the clarity of these indications and making a positive impact on the recipient with understanding so it is a means for the purpose of reaching the effect and effectiveness of the message symbols from the movements of lines in which elements that are supposed to be equal in the performance of their functions and the purpose of their existence gather to achieve the mental response of perception, understanding and enjoyment. It must be in an objective unity based on the balance in this distribution. To form a formal organizational unit and an integrated system, the result of which is to gi

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Effect of Public Debt on The Trade Balance in Iraq For The Period (2003-2021)
...Show More Authors

Despite the significant increase in public spending in Iraq, it was not directed toward the important sectors that have an important role in correcting the productive structure. Rather, most of the public expenditure was going to cover the required imports, or to face shocks, whether security or health, and this caused a continuous decrease in the volume of Iraq's exports of goods and services, as the aim of the study was to review the importance of public debt and its impact on the trade balance, as well as to know the economic policies that can contribute to strengthening the trade balance, as the study proved through the (ARDL) model that there is a direct relationship between the domestic debt and the net trade balance, and an invers

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Iraqi Journal Of Physics
Water balance of the basin of Mandali/ east part of Iraq
...Show More Authors

Mandali Basin is located between latitudes (33◦ 39' 00" and 33
54' 55") to the north and longitudes (45ο 11' 00" and 45ο 40' 00") to the
east; to the east of Diyala province at the Iraqi-Iranian border; the
basin area is approximately 491 km2.
From the study of climate reality of the basin between 1990-
2013and assessment of the basic climate transactions, it was found
that the annual rate of rainfall is 253.02 mm, the relative humidity
(44.4%), the temperature (21.3 ◦C), wind speed (2.08 m /sec.),
sunshine (8.27 h/day) and evaporation of the basin class (a) (271.98
mm) and corrected potential evapotranspiration (80.03 mm). The
results of the data analysis show that, there are

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Iraqi Geological Journal
CLIMATIC WATER BALANCE FOR ISHAQI AREA, SALAH AL-DEAN GOVERNORATE, IRAQ
...Show More Authors

In any natural area or water body, evapotranspiration is one of the main outcomes in the water balance equation. It is also a crucial component of the hydrologic cycle and considers as the main requirement in the planning and designing of any irrigation project. The climatic parameters for the Ishaqi area are calculated from the available date of Samarra and Al-Khlais meteorological stations according to a method for the period (1982–2017) according to Fetter method. The results of the mean of rainfall, relative humidity temperature, evaporation, sunshine, and wind speed of the Ishaqi area are 171.96 mm, 49.67%, 24.86 C°, 1733.61 mm, 8.34 h/day, and 2.3 m/sec, respectively. Values of Potential Evapotranspiration are determined by

... Show More
View Publication
Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
Load-settlement Behavior of Steel Piles in Different Sandy Soil Configurations
...Show More Authors

In the case where a shallow foundation does not satisfy with design requirements alone, the addition of a pile may be suitable to improve the performance of the foundation design. The lack of in-situ data and the complexity of the issues caused by lagging in the research area of pile foundations are notable. In this study, different types of piles were used under the same geometric conditions to determine the load-settlement relationships with various sandy soil relative densities. The ultimate pile capacity for each selected pile is obtained from a modified California Bearing Ratio (CBR) machine to be suitable for axial pile loading. Based on the results, the values of Qu for close-ended square pile were increased by 15

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref