Link failure refers to the failure between two connections/nodes in a perfectly working simulation scenario at a particular instance. Transport layer routing protocols form an important basis of setting up a simulation, with Transmission Control Protocol and User Datagram Protocol being the primary of them. The research makes use of Network Simulator v2.35 to conduct different simulation experiments for link failure and provide validation results. In this paper, both protocols, TCP and UDP are compared based on the throughput of packets delivered from one node to the other constrained to the condition that for a certain interval of time the link fails and the simulation time remains the same for either of the protocols. Overall, this analysis is based on determining the performance of both protocols with a fixed packet size and bandwidth. This analysis, performed with the help of NS2 and XGraph, shows that the transport layer protocol, UDP acts better than TCP in terms of throughput. This opens the questions to other fellow researchers of how different metrics act in both the cases when a link failure occurs. In UDP, the throughput drops less as compared to the TCP at the time of the link failure regardless of if simulation was executed for different time periods i.e., 70,100,300,900 and 1000 seconds. The link failure interval is also varied from 10,15,20,40,350 and 440 seconds to generalize and validate the performance of the network during the interval.
Face detection is one of the important applications of biometric technology and image processing. Convolutional neural networks (CNN) have been successfully used with great results in the areas of image processing as well as pattern recognition. In the recent years, deep learning techniques specifically CNN techniques have achieved marvellous accuracy rates on face detection field. Therefore, this study provides a comprehensive analysis of face detection research and applications that use various CNN methods and algorithms. This paper presents ten of the most recent studies and illustrate the achieved performance of each method.
This paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul
... Show MoreThis paper proposes an on-line adaptive digital Proportional Integral Derivative (PID) control algorithm based on Field Programmable Gate Array (FPGA) for Proton Exchange Membrane Fuel Cell (PEMFC) Model. This research aims to design and implement Neural Network like a digital PID using FPGA in order to generate the best value of the hydrogen partial pressure action (PH2) to control the stack terminal output voltage of the (PEMFC) model during a variable load current applied. The on-line Particle Swarm Optimization (PSO) algorithm is used for finding and tuning the optimal value of the digital PID-NN controller (kp, ki, and kd) parameters that improve the dynamic behavior of the closed-loop digital control fue
... Show MoreThe study involved the description of the environmental characters and distribution of Anogramma leptophylla (Annual Maidenhair fern) in Erbil and Garmian districts during May- 2017 in Kurdistan of Iraq. The geographical distribution of the taxa was recorded in Bani Bee region for the first time within the Garmian district but it was recorded before in the Zar Gali region within the Erbil district. The climatic characters of the studied site in Erbil district were: moist, cold and the elevation was up to 560 m above sea level with sandy clay soil texture whereas in the Garmian district: dry, hot, and the elevation was only 330 m above sea level with sandy stone soil. Plant up to 13 cm long, megaphyl
... Show MoreThe effect of air injection angle on the performance of airlift pump used for water pumping has been studied analytically and experimentally. An airlift pump of dimensions 42mm diameter and 2200 mm length with conventional and modified air injection device was considered. A modification on conventional injection device (normal air-jacket type) was carried out by changing injection angle from 90 (for conventional) to 45 and 22.5 (for modified). Continuity and one-dimensional momentum balance for the flow field with basic principle of two-phase flow and expressions of slip ratio and friction factor as function of flow rates were formulated. The analytical and experimental investigations were carried out f
... Show MoreEncasing glass fiber reinforced polymer (GFRP) beam with reinforced concrete (RC) improves stability, prevents buckling of the web, and enhances the fire resistance efficiency. This paper provides experimental and numerical investigations on the flexural performance of RC specimens composite with encased pultruded GFRP I-sections. The effect of using shear studs to improve the composite interaction between the GFRP beam and concrete was explored. Three specimens were tested under three-point loading. The deformations, strains in the GFRP beams, and slippages between the GFRP beams and concrete were recorded. The embedded GFRP beam enhanced the peak loads by 65% and 51% for the composite specimens with and without shear connectors,
... Show MoreSo far, APT (Advanced Persistent Threats) is a constant concern for information security. Despite that, many approaches have been used in order to detect APT attacks, such as change controlling, sandboxing and network traffic analysis. However, success of 100% couldn’t be achieved. Current studies have illustrated that APTs adopt many complex techniques to evade all detection types. This paper describes and analyzes APT problems by analyzing the most common techniques, tools and pathways used by attackers. In addition, it highlights the weaknesses and strengths of the existing security solutions that have been used since the threat was identified in 2006 until 2019. Furthermore, this research proposes a new framework that can be u
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show More