Dropping packets with a linear function between two configured queue thresholds in Random Early Detection (RED) model is incapable of yielding satisfactory network performance. In this article, a new enhanced and effective active queue management algorithm, termed Double Function RED (DFRED in short) is developed to further curtail network delay. Specifically, DFRED algorithm amends the packet dropping probability approach of RED by dividing it into two sub-segments. The first and second partitions utilizes and implements a quadratic and linear increase respectively in the packet dropping probability computation to distinguish between two traffic loads: low and high. The ns-3 simulation performance evaluations clearly indicate that DFRED algorithm significantly controls the average queue occupancy and yields a reasonable gain in end-to-end-delay under different network conditions.
Total of 46 isolates of Klebsiella pneumoniae were collected from patients attending (Al-Yarmook Hospital and Education Labs / medical city), and isolates were re-identified, depending on morphology and biochemical tests . Disk diffusion method was employed to determine antibiotic susceptibility of forty six isolates by using eleven antibiotics .The results revealed the sensitivity of six isolates (9.3%) to Imipenem and Meropenem . On the other hand the isolates were showed 23.9% resistant against Ciprofloxacin, while some isolates shown higher resistant against several antimicrobial agents such as 65.2%, 69.0% for Amikacin and Cefepime consequently , 71.1%, 71.7 % for Amoxicillin -Clauvulanic acid and Gentamicin and 82.6% against Pipera
... Show MoreObjectives of the study: The main objective of the study is to assess the prevalence of hypertension among
cardiac diseases patients and to fiend out relation ship between hypertension and cardiovascular diseases.
Methodology: A descriptive study, using interviewer and questionnaire technique was conducted on cardiac
diseases inpatients of clinic unite at Kirkuk and Azady hospitals from 17th ,June ,2012 to 1st, March , 2013.
Non – probability (purposive) sample of (148) adult patients, (81) females and (67) males with heart disease are
selected from inpatients of clinic unite at Kirkuk and Azady hospitals at kirkuk city. Questionnaire was
developed to assess the items which are related to heart disease patient's (Dise
Nine Iraqi varieties of barley (Hordeum vulgare L.) has been differentiated and diagnosed using simple sequence repeat markers to detect their genetic polymorphism. Six SSR primers were used for genetic screening of barley samples (IPA 265, IPA 99, Tuwaitha, Hitra, Rayhan, Shuaa, Bawadi, Samir and Al_khair). These primers generated total PCR product (11) bands divided to 8 polymorphic bands 3 monomorphic bands. the percentage of polymorphism 80% ranged between (50-100%). a mean value of polymorphic band per primer was 1.6 . these primers produced amplification fragment at Molecular weight between 75-900 bp. One unique band was generated at size 200bp, this band can be used as a DNA profiling of all studied genotypes. These results appear
... Show MoreThe recent emergence of sophisticated Large Language Models (LLMs) such as GPT-4, Bard, and Bing has revolutionized the domain of scientific inquiry, particularly in the realm of large pre-trained vision-language models. This pivotal transformation is driving new frontiers in various fields, including image processing and digital media verification. In the heart of this evolution, our research focuses on the rapidly growing area of image authenticity verification, a field gaining immense relevance in the digital era. The study is specifically geared towards addressing the emerging challenge of distinguishing between authentic images and deep fakes – a task that has become critically important in a world increasingly reliant on digital med
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThe study consists of video clips of all cars parked in the selected area. The studied camera height is1.5 m, and the video clips are 18video clips. Images are extracted from the video clip to be used for training data for the cascade method. Cascade classification is used to detect license plates after the training step. Viola-jones algorithm was applied to the output of the cascade data for camera height (1.5m). The accuracy was calculated for all data with different weather conditions and local time recoding in two ways. The first used the detection of the car plate based on the video clip, and the accuracy was 100%. The second is using the clipped images stored in the positive file, based on the training file (XML file), where the ac
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreCoronavirus is considered the first virus to sweep the world in the twenty-first century, it appeared by the end of 2019. It started in the Chinese city of Wuhan and began to spread in different regions around the world too quickly and uncontrollable due to the lack of medical examinations and their inefficiency. So, the process of detecting the disease needs an accurate and quickly detection techniques and tools. The X-Ray images are good and quick in diagnosing the disease, but an automatic and accurate diagnosis is needed. Therefore, this paper presents an automated methodology based on deep learning in diagnosing COVID-19. In this paper, the proposed system is using a convolutional neural network, which is considered one o
... Show MoreThere are many events that took place in Al Mosul province between 2013 and 2018. These events led to many changes in the area under study. These changes involved a decrease in agricultural crops and water due to the population leaving the area. Therefore, it is imperative that planners, decision-makers, and development officials intervene in order to restore the region's activity in terms of environment and agriculture. The aim of this research is to use remote sensing (RS) technique and geographic information system (GIS) to detect the change that occurred in the mentioned period. This was achieved through the use of the ArcGIS software package for the purpose of assessing the state of lands of agricultural crops and
... Show More