The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
In this paper, we will study non parametric model when the response variable have missing data (non response) in observations it under missing mechanisms MCAR, then we suggest Kernel-Based Non-Parametric Single-Imputation instead of missing value and compare it with Nearest Neighbor Imputation by using the simulation about some difference models and with difference cases as the sample size, variance and rate of missing data.
This study is concerned with shedding light on the grammatical method of Ibn Hisham Al-Ansari (761 AH), in his explanation of Bant Souad’s poem by the poet Kaab bin Zuhair, and I included a brief description of Ibn Hisham’s life with a number of explanations of this poem, then clarified the most important features of this method The grammar represented by his reliance on hearing and presenting it to analogy with mention of types of analogy, as well as his attribution of opinions to their owners with weighting, selection and balancing, and his attention to reasoning and a number of grammatical ailments, and his approach is also distinguished by following the method of fractal.
... Show More
The corrosion protection of low carbon steel in 2.5 M HCl solution by kiwi juice was studied at different temperatures and immersion times by weight loss technique. To study the determination of the optimum conditions from statistical design in evaluation of a corrosion inhibitor, three variables, were considered as the most dominant variables. These variables are: temperature, inhibitor concentration (extracted kiwi juice) and immersion time at static conditions.
These three variables are manipulated through the experimental work using central composite rotatable Box – Wilson Experimental Design (BWED) where second order polynomial model was proposed to correlate the studied variables with the corrosion rate o
... Show MoreMost of World nations are striving to provide the necessary needs to protect their economic properties assets against natural or abnormal disasters that may be inflicted on such property and the means that used by such countries to reduce the damages is insurance, whereas insurance as a system that collects and distributes different risks into the group thus to achieve a social symbiosis between individuals. The system works to transfer the risks from the individual to the group and then distributes the losses to all members of the group.
According to the importance of the insurance sector and the need to develop it as well as working on improving its performance, this search aims to identify the ac
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreForty patients with acute lymphoblastic leukemia(ALL) were tested for the serum levels of total sialic acid(TSA) and the immunoglobulins before and after treatnemnt with six diffrent chemotherapy protocols while significantly
Background. The anterior communicating artery (ACoA) complex consists of the ACoA, the pre-and post-communicating segments of the anterior cerebral artery, and the recurrent artery of Heubner. It is the most common site for anatomical variations in the circle of Willis. Such variations can mimic intracranial aneurysms. Case description. A 30-year-old female presented with recurrent episodes of extreme headache and bilateral tinnitus. A brain computed tomography (CT) scan showed no significant lesions, while her CT-angiography (CTA) showed an enlarged vascular lesion at the ACoA, raising the suspicion for an ACoA aneurysm. A repeated CTA revealed a rare anatomical variation with a pattern of cross dominance in the ACoA complex;
... Show More