This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to 92.19%, availability 92.375%, and reliability 100%. The proposed system managed five devices. The NSFM implemented using Java and C# languages.
Nowadays, a very widespread of smartphones, especially Android smartphones, is observed. This is due to presence of many companies that produce Android based phones and provide them to consumers at reasonable prices with good specifications. The actual benefit of smartphones lies in creating communication between people through the exchange of messages, photos, videos, or other types of files. Usually, this communication is through the existence of an access point through which smartphones can connect to the Internet. However, the availability of the Internet is not guaranteed in all places and at all times, such as in crowded places, remote areas, natural disasters, or interruption of the Internet connection for any reason. To create a
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreTo track scientific developments and achievements, for example, that (achieved) after the Second World War until this moment, make each of us in absolute amazement. He invented the computer, discovered the genetic factor (DNA), and discovered the drawing of the human genetic map, going up to the moon, penetrating outer space by satellites, getting close to distant planets, producing jet planes, microprocessors, and lasers, in addition to enabling a person to create a layer of The material is extremely thin and extremely imaginative. It has also become possible for a person to "dig lines that do not exceed 20 billion meters of thickness." The human being was also able to collect things an atom and build an efficient and high-precision con
... Show MoreThe design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program
... Show MoreTransmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p
... Show MoreThis research investigates the type and the significant relationship between roaming management and self-efficacy and its impact on excellence in providing hotel service. To achieve this, the applied approach was adopted through A questionnaire was designed and developed for the collected data. It has consisted of three parts. The firsts section included nine questions to measure the dimensions of management by roaming. The second section includes nine questions to measure the effectiveness of the two employees. The last section includes 12 questions to measure the excellence of the hotel service. The research sample included 43 employees' responding to this
... Show MoreThe study aims to test the relationship of work pressure to its dimensions (role conflict, ambiguity of role, workload and nature of work) as an independent variable and its effect on organizational alienation by its dimensions (disability, lack of power, indifference, animosity, social isolation and self-alienation) (Restraint and confidence in negation, initiative, adaptation and living conscience) as a mediator variable, in some faculties of Baghdad University of Science (Medicine and Engineering) and Humanity (Education and Literature). The data was collected on the practical side, which was applied randomly (306) of the teachers and teachers of the colleges (56) items, which included the main research variables
... Show MoreThis paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t
... Show MoreObjective: study aims to identify the diabetes type2 clients self management skills toward dietary pattern
, and find out the relationship between variables which are (Age, gender, educational level, duration of DM
diagnosis, and monthly income) with diabetes type 2 clients self management skills toward dietary pattern
Methodology: descriptive study was carried out through the present investigation from January 2nd
2011to September 2nd 2011 in order to achieve the objectives of the present study. A non probability
(purposive) sample, (200) cases which consists of clients who were attending Al-Nasiriyha diabetic center.
Including (118) males and (82) females. The data were collected by utilization of the study instrument
Objective(s): To Evaluate Diabetes self –management among patients in Baghdad City and to compare
between these patients self-management relative to the type of the disease.
Methodology: A descriptive design was conducted in Baghdad city, started from November 16th 2017 to the
end of May 17 th 2018 in order to evaluate Diabetes self-management. Purposive (non-probability) sample,
which was consisted of (120) patients who were diagnosed with D.M. The sample is comprised of (60) patient
with diabetes type I and (60) patient with diabetes type II. It is consisted of (60) male and (60) female. A
questionnaire is constructed for the purpose of the study. It is composed of (42) items. Reliability and validity of
the ques