Dropping packets with a linear function between two configured queue thresholds in Random Early Detection (RED) model is incapable of yielding satisfactory network performance. In this article, a new enhanced and effective active queue management algorithm, termed Double Function RED (DFRED in short) is developed to further curtail network delay. Specifically, DFRED algorithm amends the packet dropping probability approach of RED by dividing it into two sub-segments. The first and second partitions utilizes and implements a quadratic and linear increase respectively in the packet dropping probability computation to distinguish between two traffic loads: low and high. The ns-3 simulation performance evaluations clearly indicate that DFRED algorithm significantly controls the average queue occupancy and yields a reasonable gain in end-to-end-delay under different network conditions.
A collection of 118 specimens of Iraqi phasianid birds belong to four species was examined
for haematozoa. Results show that 21.2% of them were infected with one or more of four
species of blood parasites; Haemoproteus danilewskyi, H. santosdiasi, Plasmodium sp. and
microfilaria. Haemoproteus danilewskyi is reported here for the first time in Iraq.
The notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.
The traditional voice call over Global System for Mobile Communications (GSM) and Public Switched Telephone Network (PSTN) is expensive and does not provide a secure end to end voice transmission. However, the growth in telecommunication industry has offered a new way to transmit voice over public network such as internet in a cheap and more flexible way. Due to insecure nature of the public network, the voice call becomes vulnerable to attacks such as eavesdropping and call hijacking. Accordingly, protection of voice call from illegal listening becomes increasingly important.
To this end, an android-based application (named E2ESeVoice application) to transmit voice in a secure way between the end users is proposed based on modified R
The present study aims at analyzing the polysemy of the English preposition in from the cognitive linguistic (CL) point of view using Evans' and Tyler's approach (2003). The perplexity faced by Iraqi second language learners (L2) due to the multi-usages of this preposition has motivated the researcher to conduct this study. Seventy-six second year university students participated in this experimental study. The data of the pre-test and post-test were analyzed by SPSS statistical editor. The results have shown the following: First, a progress of more than (0.05≤) has been detected as far as students' understanding of the multiple usages of the preposition in is concerned. Second, the results of the questionnaire have s
... Show MoreAn excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.
The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreGraph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Objective: To assess role of obesity in Covid-19 patients on antibodies production, diabetes development, and treatment of this disease. Methodology: This observational study included 200 Covid-19 patients in privet centers from January 1, 2021 to January 1, 2022. All patients had fasting blood sugars and anti-Covid-19 antibodies. Anthropometric parameters were measured in all participants. Results: The patients were divided into two groups according to body weight; normal body weight (50) and excess body weight (150). There was a significant difference between them regarding age. Diabetes mellitus developed in 20% of normal weight patients while 80% of excess weight patients had diabetes (p=0.0001). Antibodies production (IgM and
... Show MoreOpenStreetMap (OSM), recognised for its current and readily accessible spatial database, frequently serves regions lacking precise data at the necessary granularity. Global collaboration among OSM contributors presents challenges to data quality and uniformity, exacerbated by the sheer volume of input and indistinct data annotation protocols. This study presents a methodological improvement in the spatial accuracy of OSM datasets centred over Baghdad, Iraq, utilising data derived from OSM services and satellite imagery. An analytical focus was placed on two geometric correction methods: a two-dimensional polynomial affine transformation and a two-dimensional polynomial conformal transformation. The former involves twelve coefficients for ad
... Show More