Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject area is the optimal self-organized service placement. In this paper a heuristic-based algorithm for service placement in future networks was presented. This algorithm achieves the ideal placement of services replicas by monitoring the load within the server and its neighborhood, choosing the node that contributes with the highest received load, and finally replicating or migrating the service to it based on specific criteria, so that the distance of requests coming from clients becomes as small as possible because of placing services within nearby locations. It was proved that our proposed algorithm achieves an improved performance by meeting the services within a shorter time, a smaller bandwidth, and thus a lower communication cost. It was compared with the traditional client-server approach and the random placement algorithm. Experimental results showed that the heuristic algorithm outperforms other approaches and meets the optimal performance with different network sizes and varying load scenarios.
An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show MoreSpraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...
أن للتطرف العنيف أسباب متنوعة تقف وراء ظهوره وتمدده في دول العالم المختلفة على نطاق واسع، إذ إن لكل بيئة ظروفها وخصوصياتها الكلية والفرعية التي تسهم في تعزيز القدرة التأثيرية للسلوكيات العنفية في إطار مجتمع ما، لاسيما إذا علمنا إن التطرف العنيف المؤدي الى الإرهاب كسلوكيات عنفية متطرفة مدمرة للبناء المجتمعي ما كان ليستمر لولا وجود بيئة حاضنة وظروف تساعد في انتشاره واستمرارية قدراته التأثيرية في البناء السي
... Show Moreأن للتطرف العنيف أسباب متنوعة تقف وراء ظهوره وتمدده في دول العالم المختلفة على نطاق واسع، إذ إن لكل بيئة ظروفها وخصوصياتها الكلية والفرعية التي تسهم في تعزيز القدرة التأثيرية للسلوكيات العنفية في إطار مجتمع ما، لاسيما إذا علمنا إن التطرف العنيف المؤدي الى الإرهاب كسلوكيات عنفية متطرفة مدمرة للبناء المجتمعي ما كان ليستمر لولا وجود بيئة حاضنة وظروف تساعد في انتشاره واستمرارية قدراته التأثيرية في البناء السي
... Show MoreWith the development of modern mass media and the prevalence of use continues to both researchers and practitioners their efforts to understand how the media affect Hzha on both the individual and the institutions, society and culture as a whole, which means that the need to develop models and theories explain and predict the effects of the use of such means, therefore, the study of modern technologies of communication and information as an area of research has become mature to establish the intellectual base cohesive, but they are not mature enough, which calls for more research developments therefore become social networking sites online, (Facebook, and YouTube, and straining) known today as the new social media, which is witness
... Show MoreObjective: To evaluate the client's satisfaction about the services provided in primary health care centers in the
city of Baghdad and its impact on the improvement of services.
Methodology: A simple random sample consisting of (200) clients to primary health care centers in the city of
Baghdad, (15-20) clients for each center using a questionnaire to evaluate the client's satisfaction for the service
and the use of the direct method of interview, which lasts for (6-10) minutes.
Results: Results of the study show that the number of men visits to primary health care centers, fewer women
This indicates that the most important responsibilities of family members and private health care is the
responsibility of women than
Recently new and multiple concepts emerged in the sustainability issues ,which transformed into number of planning and designing policies and strategies that must be committed by the designers and the relevant trends in building ,regarding Iraq and the reality of industrial areas ,especially in Baghdad, which helped to sustain few of it & emerged another with bad reflect ,which for that made it clear the importance of implicating sustainable ecological planning and designing strategies provided by the concept of Eco-industrial parks and the concept of Ecotowns and the future potentials provided ,and the easiness of carrying it out which made it flexible and away to provide a base supported by it for rebuilding and rehabilitation and
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreA biconical antenna has been developed for ultra-wideband sensing. A wide impedance bandwidth of around 115% at bandwidth 3.73-14 GHz is achieved which shows that the proposed antenna exhibits a fairly sensitive sensor for microwave medical imaging applications. The sensor and instrumentation is used together with an improved version of delay and sum image reconstruction algorithm on both fatty and glandular breast phantoms. The relatively new imaging set-up provides robust reconstruction of complex permittivity profiles especially in glandular phantoms, producing results that are well matched to the geometries and composition of the tissues. Respectively, the signal-to-clutter and the signal-to-mean ratios of the improved method are consis
... Show More