Preferred Language
Articles
/
ijs-6872
NS2 – Based Experimental Analysis of Throughput for TCP and UDP Traffic During Link Failure of The Network
...Show More Authors

     Link failure refers to the failure between two connections/nodes in a perfectly working simulation scenario at a particular instance. Transport layer routing protocols form an important basis of setting up a simulation, with Transmission Control Protocol and User Datagram Protocol being the primary of them. The research makes use of Network Simulator v2.35 to conduct different simulation experiments for link failure and provide validation results. In this paper, both protocols, TCP and UDP are compared based on the throughput of packets delivered from one node to the other constrained to the condition that for a certain interval of time the link fails and the simulation time remains the same for either of the protocols. Overall, this analysis is based on determining the performance of both protocols with a fixed packet size and bandwidth. This analysis, performed with the help of NS2 and XGraph, shows that the transport layer protocol, UDP acts better than TCP in terms of throughput. This opens the questions to other fellow researchers of how different metrics act in both the cases when a link failure occurs. In UDP, the throughput drops less as compared to the TCP at the time of the link failure regardless of if simulation was executed for different time periods i.e., 70,100,300,900 and 1000 seconds. The link failure interval is also varied from 10,15,20,40,350 and 440 seconds to generalize and validate the performance of the network during the interval.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 03 2024
Journal Name
Optical And Quantum Electronics
Design and analysis of a dual-core PCF biosensor based on SPR for cancerous cells detection
...Show More Authors

View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
"Using Markov Switching Model to Investigate the Link between the Inflation and Uncertain Inflation in Iraq for the periods 1980-2010"
...Show More Authors

In this paper we use the Markov Switching model to investigate the link between the level of Iraqi inflation and its uncertainty; forth period 1980-2010 we measure inflation uncertainty as the variance of unanticipated  inflation. The results ensure there are a negative effect of inflation level on inflation uncertainty and  all so there are a positive effect of inflation uncertainty on inflation level.                                                   &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 29 2020
Journal Name
Energy & Fuels
Stable Dispersion of Coal Fines during Hydraulic Fracturing Flowback in Coal Seam Gas Reservoirs—An Experimental Study
...Show More Authors

In subterranean coal seam gas (CSG) reservoirs, massive amounts of small-sized coal fines are released during the production and development stages, especially during hydraulic fracturing stimulation. These coal fines inevitably cause mechanical pump failure and permeability damage due to aggregation and subsequent pore-throat blockage. This aggregation behavior is thus of key importance in CSG production and needs to be minimized. Consequently, such coal fines dispersions need to be stabilized, which can be achieved by the formulation of improved fracturing fluids. Here, we thus systematically investigated the effectiveness of two additives (ethanol, 0.5 wt % and SDBS, 0.001 and 0.01 wt %) on dispersion stability for a wide range of condit

... Show More
Preview PDF
Scopus (76)
Crossref (72)
Scopus Clarivate Crossref
Publication Date
Sat Feb 08 2025
Journal Name
Modern Sport
The reasons for the failure of simple assault and its relationship to the level of levelp performance skill players weapon sword
...Show More Authors

The method of analysis is one of the tools the coach to identify strengths andweaknesses of each player, and how to avoid mistakes that in the course ofperformance on the other hand, Voslob analysis is important for the player, as throughthe analysis will determine the capacity enjoyed by both the coach and player, as wellas being the possibility of progress in a scientific manner thoughtful, and also helps inthe evaluation of physical and skill level and tactical, psychological and trainingcapacity of the coach in order to avoid obstacles and make the coach is movingtowards the right track to improve the good level, and then an investigation tocomplete higher education.Hence the importance of research in the analysis of simple attack and n

... Show More
View Publication
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Swelling Behavior of Cross-link PVA with Glutaraldehyde
...Show More Authors

             The polymeric hydrogels composed of poly vinyl alcohol (m.wt 72000) and glutaraldehyde(5%,8% and 10%) , have been thermally prepared for the purpose of studying their swelling and drug  release behavior .      The swelling ratio was measured for all the hydrogel samples at 37°C, in three different media pH (1.2, 4.7 and 6.8) as a function of time. The results show  that the maximum swelling ratios were arranged as follows :pH =6.8 >  pH =4.7 > pH =1.2 hydrogels cross linked PVA showed a typical pH  responsive behavior such as high pH has maximum swelling while low  pH  shows minimum swelling.

View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improving Detection Rate of the Network Intrusion Detection System Based on Wrapper Feature Selection Approach
...Show More Authors

Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra

... Show More
View Publication Preview PDF