Preferred Language
Articles
/
ijs-2090
SDN-assisted Service Placement for the IoT-based Systems in Multiple Edge Servers Environment

Edge computing is proved to be an effective solution for the Internet of Things (IoT)-based systems. Bringing the resources closer to the end devices has improved the performance of the networks and reduced the load on the cloud. On the other hand, edge computing has some constraints related to the amount of the resources available on the edge servers, which is considered to be limited as compared with the cloud. In this paper, we propose Software-Defined Networking (SDN)-based resources allocation and service placement system in the multi-edge networks that serve multiple IoT applications. In this system, the resources of the edge servers are monitored using the proposed Edge Server Application (ESA) to determine the state of the edge server and, therefore, the acceptable services by each server. Benefiting from the information gathered by ESA, the service offloading decision would be taken by the proposed SDN Non-core Application (SNA) in a way that ensures an efficient load distribution and better resources utilization for the edge servers. A Weighted Aggregated Sum Product Assessment Method (WASPAS) was used to determine the best edge server. The proposed system was compared with a non-SDN system and showed improvement in the performance and the utilization of resources of the edge servers. Furthermore, the request handling time was considerably reduced and settled in constant rates for a different number of devices.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 19 2019
Journal Name
Iraqi Journal Of Science
Real Time Multi Face Blurring on Uncontrolled Environment based on Color Space algorithm

Faces blurring is one of the important complex processes that is considered one of the advanced computer vision fields. The face blurring processes generally have two main steps to be done. The first step has detected the faces that appear in the frames while the second step is tracking the detected faces which based on the information extracted during the detection step. In the proposed method, an image is captured by the camera in real time, then the Viola Jones algorithm used for the purpose of detecting multiple faces in the captured image and for the purpose of reducing the time consumed to handle the entire captured image, the image background is removed and only the motion areas are processe

... Show More
Scopus (3)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Wed Nov 20 2024
Journal Name
Journal Of Baghdad College Of Dentistry
Corticotomy assisted orthodontic canine retraction

Background: Surgical injury to alveolar bone can temporarily accelerate tooth movement by increasing the remodeling rate of alveolar bone. The purpose of this study was to clinically evaluate maxillary canine retraction acceleration with corticotomy-facilitated orthodontics, and its effect on vitality of pulp and gingival sulcus depth. Materials and method: The sample consisted of 12 adult patients (4 males, 8 females; mean age, 21.7 years) requiring the therapeutic extraction of the maxillary first premolars, with subsequent retraction of the maxillary canines. Surgical holes were done mesially and distally to the side with more space between canine and second premolar, and the other side served as the control. Canine retraction was done

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Journal Of The Faculty Of Medicine Baghdad
The Role of Trace elements in Multiple Sclerosis.

Background:  Multiple sclerosis (MS)  is a  chronic,  demyelinating disease  of  the central nervous system (CNS) affecting young adults and is considered as the leading cause of non traumatic neurological disability of young adults (1). The pathogenesis of MS is still incompletely understood. Deviation of immune responses in a genetically susceptible patient p

Fac Med Baghdad

2014; Vol.56, No.2

Received: Feb., 2014

Accepted April. 2014

 

 
... Show More
Crossref
View Publication Preview PDF
Publication Date
Thu Mar 02 2023
Journal Name
Applied Sciences
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach

... Show More
Scopus (49)
Crossref (47)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Effect of plasma jet on the water and hydrogen peroxide that used for assisted teeth bleaching

In this work the interaction of plasma jet with water and hydrogen peroxide liquids used for assisted teeth bleaching by plasma jet had been study. A homemade plasma jet system was used. The plasma jet supply by 15 W electrical power generated by high voltage power supply of 9.6 kV peak to peak and frequency of 33 kHz .this power supply generate high electric field on electrodes that would be enough to ionize the argon gas. Some important agents were study such as the effect of the Ar gas flow rates on the length of the plasma jet, the influence of plasma jet on some properties of water and two hydrogen peroxide concentrations 25 % and 30 % like pH, conductivity and liquid temperature for different exposure time. The liquids temperature

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The role physical service factors in achieving customer satisfaction

The development in the presentation and presentation of the service in order to distinguish them from the same, was one of the most important reasons to choose the current issue to upgrade the level of service, especially in the Iraqi restaurant sector, which has become today of the important sectors successful. The problem of research was to try to answer a range of questions: to what extent are Iraqi restaurants interested in physical service factors? Do Iraqi restaurants apply physical factors in a way that leads to customer satisfaction? Are Iraqi restaurants interested in the satisfaction of their customers? The objective of the current research is to try to determine the extent to which the

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
COMPARATIVE STUDY FOR EDGE DETECTION OF NOISY IMAGE USING SOBEL AND LAPLACE OPERATORS

Many approaches of different complexity already exist to edge detection in
color images. Nevertheless, the question remains of how different are the results
when employing computational costly techniques instead of simple ones. This
paper presents a comparative study on two approaches to color edge detection to
reduce noise in image. The approaches are based on the Sobel operator and the
Laplace operator. Furthermore, an efficient algorithm for implementing the two
operators is presented. The operators have been applied to real images. The results
are presented in this paper. It is shown that the quality of the results increases by
using second derivative operator (Laplace operator). And noise reduced in a good

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
Scopus Crossref
View Publication
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
edge detection using modification prewitt operators

in this paper we adopted ways for detecting edges locally classical prewitt operators and modification it are adopted to perform the edge detection and comparing then with sobel opreators the study shows that using a prewitt opreators

Crossref
View Publication Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Boosting the Network Performance using Two Security Measure Scenarios for Service Provider Network

Network security is defined as a set of policies and actions taken by a network administrator in order to prevent unauthorized access, penetrated the defenses and infiltrated the network from unnecessary intervention. The network security also involves granting access to data using a pre-defined policy. A network firewall, on the other hand, is a network appliance that controls incoming and outgoing traffic by examining the traffic flowing through the network. This security measure establishes a secure wall [firewall] between a trusted internal network and the outside world were a security threat in shape of a hacker or a virus might have existed

Scopus (3)
Scopus Crossref
View Publication Preview PDF