The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presented in real time which is minimizing the cost that represents the important factor to successful management of networks that was achieved using agents.
An edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon the best of the messengers, Muhammad, and all his family and companions. And after:
For when I had the pleasure of looking at the chapters of the Noble Qur’an, and its evident signs, my view fell on one of its brightest verses, and it is the Almighty saying: ﭽﯜ ﯝ ﯞ ﯟ ﯠ ﯡ ﯢ ﯣ ﯤ ﯥ ﯦ ﯧ ﯨﭼ (). The tag: (God’s Greatness in Creating a Hoopoe). The research methodology required that I divide it into four sections:
The first topic: an overview of birds.
The second topic: the characteristics and characteristics of hoopoe.
The third topic: the logic of the bird.
The fourth topic: Praise the bird.
This has relied in my research on
The research aims to indicate the relationship between lean production tools included seven {constant improvement , and Just in time (JIT), and the production smoothing , and quality at the source, and standardized work, Visual management, and activities 5S } and Mass Customization strategy for the model (Pine & Gilomer, 1997) {collaborative, adaptive, cosmetic, transparent}, as well as providing a conceptual framework and applied for variables search to clarify how they will choose a Mass Customization strategy through the lean production tools, , and recognize the reality of the practices of Iraqi industries in such a field. Moreover, aims to highlight the positive aspects that accrue to companies a
... Show MoreTrajectory tracking and vibration suppression are essential objectives in a flexible joint manipulator control. The flexible joint manipulator is an under-actuated system, in which the number of control actions is less than the degree of freedom to be controlled. It is very challenging to control the underactuated nonlinear system with two degree of freedom. This paper presents a hierarchical sliding mode control (HSMC) for a rotary flexible joint manipulator (RFJM). Firstly, the rotary flexible joint manipulator is modeled by two subsystems. Secondly, the sliding surfaces for both subsystems are constructed. Finally, the control action is designed based on the Lyapunov function. Computer simulation results demonstrate the effectiveness of
... Show MoreShatt Al-Arab River in Al Basrah, Iraq, has recently recorded massive levels of TDS values (Total Dissolved Solids) in the water as a result of reduced fresh water discharge from sources, causing the river to become salinized due to salt wedge intrusion. Therefore, a block dam in the south reach is required to salt intrusion prevention. The main objective of this research is to simulate the hydraulic impact of a suggested barrage in Ras Al Besha on the Shatt Al-Arab River. The HEC-RAS (5.0.7) model was used to develop a one-dimensional unsteady model to gaining an understanding of the proposed barrage's influence on river behaviour. The daily discharges of the Tigris River provided as the upstream boundary conditions, wh
... Show MoreBackground Molluscum contagiosum is skin disease caused by the molluscum contagiosum virus (MCV) usually causing one or more small dome shaped umbilicated papules with symptoms that maybe self-resolve. MCV was once a disease primarily of children, but it has evolved to become a sexually transmitted disease in adults. It is believed to be a member of the pox virus family. In addition to the classic presentation of the disease; it can also come in different clinical forms that simulate large number of dermatolological disease.
Objective: To study different clinical forms of Molluscum contagiosum presentation in different age groups of Iraqi patients.
Method:This clinical descriptive study was performed in the outpatient department of
Normal thyroid function is essential for neonatal growth and brain development. In a newborn infant with severe disease, endocrine regulation of hormones can be affected by abnormal metabolism. The assessment of thyroid parameters results in the recognition of a dysfunction and its association with disease severity
Locking of the knee is a one of the commonest orthopedic outpatient presentation. This patient usually need magnetic resonance imaging (MRI) when there is suspected lesion in the soft tissue clinically. Meniscal tears is the first differential diagnosis when accompany with painful knee. (1, 2)
Giant cell tumor (GCT) is benign a localized nodular tenosynovitis often occur in the tendon sheath , Mostly involve the hand tendons in middle age group between 30 and 50 years old , female affect more than male.(3,4) The WHO defines two well-known kinds of giant cell tumor: (1) pigmented villonodular synovitis ( generalized type), which mainly involve the joints of the lower limb and (2) giant cell tumor of the tendon sheath ( localized type)
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More