Preferred Language
Articles
/
bsj-6338
Distributed Heuristic Algorithm for Migration and Replication of Self-organized Services in Future Networks
...Show More Authors

Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject area is the optimal self-organized service placement. In this paper a heuristic-based algorithm for service placement in future networks was presented. This algorithm achieves the ideal placement of services replicas by monitoring the load within the server and its neighborhood, choosing the node that contributes with the highest received load, and finally replicating or migrating the service to it based on specific criteria, so that the distance of requests coming from clients becomes as small as possible because of placing services within nearby locations. It was proved that our proposed algorithm achieves an improved performance by meeting the services within a shorter time, a smaller bandwidth, and thus a lower communication cost. It was compared with the traditional client-server approach and the random placement algorithm. Experimental results showed that the heuristic algorithm outperforms other approaches and meets the optimal performance with different network sizes and varying load scenarios.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Developed JPEG Algorithm Applied in Image Compression
...Show More Authors
Abstract<p>JPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.</p>
View Publication
Scopus (9)
Crossref (8)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
Tuning of PID Controllers for Quadcopter System using Cultural Exchange Imperialist Competitive Algorithm
...Show More Authors

Quadrotors are coming up as an attractive platform for unmanned aerial vehicle (UAV) research, due to the simplicity of their structure and maintenance, their ability to hover, and their vertical take-off and landing (VTOL) capability. With the vast advancements in small-size sensors, actuators, and processors, researchers are now focusing on developing mini UAV’s to be used in both research and commercial applications. This work presents a detailed mathematical nonlinear dynamic model of the quadrotor which is formulated using the Newton-Euler method. Although the quadrotor is a 6 DOF under-actuated system, the derived rotational subsystem is fully actuated, while the translational subsystem is under-actuated. The der

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2012
Journal Name
2012 Second International Conference On Digital Information And Communication Technology And It's Applications (dictap)
The compact Genetic Algorithm for likelihood estimator of first order moving average model
...Show More Authors

Recently Genetic Algorithms (GAs) have frequently been used for optimizing the solution of estimation problems. One of the main advantages of using these techniques is that they require no knowledge or gradient information about the response surface. The poor behavior of genetic algorithms in some problems, sometimes attributed to design operators, has led to the development of other types of algorithms. One such class of these algorithms is compact Genetic Algorithm (cGA), it dramatically reduces the number of bits reqyuired to store the poulation and has a faster convergence speed. In this paper compact Genetic Algorithm is used to optimize the maximum likelihood estimator of the first order moving avergae model MA(1). Simulation results

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Mon Jul 10 2023
Journal Name
Journal Of Engineering
Analysis and Optimum Design of Self Supporting Steel Communication Tower
...Show More Authors

The present study deals with the optimum design of self supporting steel communication towers. A special technique is used to represent the tower as an equivalent hollow tapered beam with variable cross section. Then this method is employed to find the best layout of the tower among prespecified configurations. The formulation of the problem is applied to four types of tower layout
with K and X brace, with equal and unequal panels. The objective function is the total weight of the tower. The variables are the base and the top dimensions, the number of panels for the tower and member's cross section areas. The formulations of design constraints are based on the requirements of EIA and ANSI codes for allowable stresses in the members

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the efficiency of quality health services in the province of Karbala: Models using the Data envelopment analysis (DEA)
...Show More Authors

  The research aims to measure  the efficiency of health services Quality  in the province of Karbala, using the Data Envelopment analysis Models in ( 2006). According to these models the degree of efficiency ranging between zero and unity. We estimate Scale efficiency  for two types of orientation direction, which are input and output oriented direction.

  The results showed, according Input-oriented efficiency that the levels of Scale efficiency on average is ( 0.975), in the province of Karbala. While the index of Output-oriented efficiency on average is (o.946).

View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
Females' Journey into Finding the Self in Beth Henley’s Crimes of the Heart
...Show More Authors

Writing as a female playwright in theatre gives a deeper depiction of woman’s real- self. Beth Henley has succeeded in providing a new realist vision of women’s abilities to face their inevitable tragic fates and how to conquer their despair. In Crimes of the Heart, the playwright uses certain method to present the development of the heroines’ characters through blending the tragic events with a comic frame. In fact, Henley focuses on the simple humorous activities more that the importance of the tragic event to present her vision of how to survive and face the crisis of life.

Crimes of the Heart is a play that is concerned about three sisters whose lives are headed in distinctly different directions; howe

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Clients' Satisfaction with Immunization Services at Primary Health Care Centers in Baghdad, Al-Karkh
...Show More Authors

Background: Client satisfaction with the immunization service is used to evaluate the quality of the admitted service and at the same time it affects the goodness of the health care outcome.

Objectives: This study assessed the satisfaction with immunization services offered to children and factors affecting this satisfaction.

Methods: Exit interviews for clients were conducted in Baghdad, Al-Karkh in a representative sample of primary health care centers to assess clients’ satisfaction with immunization services. Clients are companions of children encountered at study settings.

Results: Among the 253 respondent clients, 183 (72.3%) reflected satisfaction with the immunization

... Show More
View Publication Preview PDF
Crossref (4)
Crossref