Preferred Language
Articles
/
bsj-6338
Distributed Heuristic Algorithm for Migration and Replication of Self-organized Services in Future Networks
...Show More Authors

Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject area is the optimal self-organized service placement. In this paper a heuristic-based algorithm for service placement in future networks was presented. This algorithm achieves the ideal placement of services replicas by monitoring the load within the server and its neighborhood, choosing the node that contributes with the highest received load, and finally replicating or migrating the service to it based on specific criteria, so that the distance of requests coming from clients becomes as small as possible because of placing services within nearby locations. It was proved that our proposed algorithm achieves an improved performance by meeting the services within a shorter time, a smaller bandwidth, and thus a lower communication cost. It was compared with the traditional client-server approach and the random placement algorithm. Experimental results showed that the heuristic algorithm outperforms other approaches and meets the optimal performance with different network sizes and varying load scenarios.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 15 2003
Journal Name
كلية الترا ث الجامعة
Estimating an Exponentiated Expanded Power Function Distribution Using an Artificial Intelligence Algorithm
...Show More Authors

The distribution of the expanded exponentiated power function EEPF with four parameters, was presented by the exponentiated expanded method using the expanded distribution of the power function, This method is characterized by obtaining a new distribution belonging to the exponential family, as we obtained the survival rate and failure rate function for this distribution, Some mathematical properties were found, then we used the developed least squares method to estimate the parameters using the genetic algorithm, and a Monte Carlo simulation study was conducted to evaluate the performance of estimations of possibility using the Genetic algorithm GA.

Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Empowerment and its impact in technical innovation Administrative An analytical study In General Company for electrical Industries
...Show More Authors

based search on two variables two main (Administrative empowerment ) and (technical innovation) target detection relationship and influence between the five dimensions (the delegation of authority , personnel training , effective communication, work teams , motivating employees) and
(technical innovation) conducted research in General Company for electrical Industries , and through the sample included the views of managers in the various administrative levels poll
.

And adopted a researcher at a major tool for data collection is questionnaire designed to find, as was the contents of the questionnaire analysis according to the Statistical Information System ( Spss), The (55) to identi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sat May 30 2020
Journal Name
Neuroquantology Journal
The Effect of Re-Use of Lossy JPEG Compression Algorithm on the Quality of Satellite Image
...Show More Authors

In this study, an analysis of re-using the JPEG lossy algorithm on the quality of satellite imagery is presented. The standard JPEG compression algorithm is adopted and applied using Irfan view program, the rang of JPEG quality that used is 50-100.Depending on the calculated satellite image quality variation, the maximum number of the re-use of the JPEG lossy algorithm adopted in this study is 50 times. The image quality degradation to the JPEG quality factor and the number of re-use of the JPEG algorithm to store the satellite image is analyzed.

View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Mon Jan 11 2021
Journal Name
Engineering, Technology & Applied Science Research
The Effect of Low Velocity Impact Loading on SelfCompacting Concrete Reinforced with Carbon Fiber Reinforced Polymers
...Show More Authors

t-Self-Compacting Concrete (SCC) reduces environmental noise and has more workability. This research presents an investigation of the behavior of SCC under mechanical loading (impact loading). Two types of cement have been used to produce SCC mixtures, Ordinary Portland Cement (OPC) and Portland Limestone Cement (PLC), which reduces the emission of carbon dioxide during the manufacturing process. The mixes were reinforced with Carbon Fiber Reinforced Polymer (CFRP) which is usually used to improve the seismic performance of masonry walls, to replace lost steel reinforcements, or to increase column strength and ductility. Workability tests were carried out for fresh SCC. Prepared concrete slabs of 500×500×50mm were tested for lo

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
مجلة العلوم الاقتصادية والإدارية
Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
...Show More Authors

Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application

Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Common Fixed Point of a Finite-step Iteration Algorithm Under Total Asymptotically Quasi-nonexpansive Maps
...Show More Authors

      Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.

View Publication Preview PDF
Scopus (15)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Assessing road networks properties based on GIS techniques: Al-Karrada Region/Baghdad as a case study
...Show More Authors

Transportability refers to the ease with which people, goods, or services may be transferred. When transportability is high, distance becomes less of a limitation for activities. Transportation networks are frequently represented by a set of locations and a set of links that indicate the connections between those places which is usually called network topology. Hence, each transmission network has a unique topology that distinguishes its structure. The most essential components of such a framework are the network architecture and the connection level. This research aims to demonstrate the efficiency of the road network in the Al-Karrada area which is located in the Baghdad city. The analysis based on a quantitative evaluation using graph th

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.