Preferred Language
Articles
/
joe-1428
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Spectrophotometric Determination of Sulfathiazole Using 2,4 –dinitrophenylhydrazine as Coupling Reagent
...Show More Authors

A rapid, sensitive and selective spectrophotometric method was developed for determination of sulfathiazole (STHZ) in aqueous solution. The method is based on the  oxidative coupling reaction with 2,4-dinitrophenylhydrazine (2,4-DNPH) in a basic medium (pH 10.9) in the presence of  potassium periodate to produce an intense orange colour, soluble in water , stable product and absorbs at 492 nm. Beer's law was in the linear range 2.0-28.0 μg/ml of sulfathiazole, the molar absorptivity, Sandellʼs sensitivity index and detection limit were 1.1437 ×104 liter. mol-1.cm-1,0.0223 μg.cm-2 and 0.1274 μg/ml respectively. The RSD value was  0.75 - 1.12 % depending on the concentration. This method was applied successfu

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 17 2020
Journal Name
Cihan University-erbil Scientific Journal
Characterization of Lactobacillus Isolates from Human Mouth and Feces as Probiotics
...Show More Authors

Probiotics are live microbes that give many health benefits to human beings and animals, the most studied and commonly used probiotics are Gram-positive bacteria; lactobacilli and bifidobacteria. At nowadays, Lactobacillus spp. constitute more than two-thirds of the total numbers of probiotic species. The present study aimed to characterize Lactobacillus that locally isolated from human mouth and feces as probiotics. A total of three Lactobacillus isolates; Lactobacillus fermentum Lb2, Lactobacillus rhamnosus Lb9, and Lactobacillus paracasei Lb10 were investigated in respect to acid and bile salts tolerance, antibiotics susceptibility, and cell surface hydrophobicity in vitro using bacterial adhesion to hydrocarbons method. In compa

... Show More
View Publication
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Engineering
A Review in Sustainable Plastic Waste in Concrete
...Show More Authors

Recently times, industrial development has increased, including plastic industries, and since plastic has a very long analytical life, it will cause environmental pollution. Therefore studies have resorted to reusing recycled plastic waste (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, some studies were reviewed and then summarized into several things, including the percentage of plastic replacement from the aggregate and the effect of this percentage on the fresh properties of concrete, such as the workability and the effect of plastic waste on the hardening properties of concrete such as dry density, compressive, tensile and flexural strength.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jul 03 2023
Journal Name
College Of Islamic Sciences
A critical methodological study in abrogative,abrogated, in a book of (Zad AlTafseer) in Surah Al-Baqara in the holy Quraan.
...Show More Authors

This research is a critical methodological  study deals with some Quranic verses abrogative,abrogated.

by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the  in the holy Quraan.

View Publication Preview PDF
Publication Date
Thu Aug 16 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
The Social Interaction of Langauge in a Comic Series: A Sociolinguistic Study
...Show More Authors

DBNRAHA Hameed, IJRSSH PUBLICATION, 2018

View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
ADVERTISING CAMPAIGNS IN TV CHANNELS : (A Research Drawn from A Master Thesis)
...Show More Authors

Television culture has become the most dangerous of our time. It manipulates with minds and hearts together; and forms consciousness. It transforms societies into actual forces rejecting certain principles by guiding the media landscape through visible connotations acceptable to the public; or provokes the citizen against elements that put a burden on the viewer or the public in order to create a positive reaction to the subject of combating terrorism by combining these ads in line with what the public wants of security and tranquility and a decent living after suffering from terrorism in the past years.

Therefore, this research deals with television advertisements as one of the most important fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
2017 Computing Conference
Protecting a sensitive dataset using a time based password in big data
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Research In Social Sciences And Humanities
THE SOCIAL INTERACTION OF LANGUAGE IN A COMIC SERIES: A SOCIOLINGUISTIC STUDY
...Show More Authors

Dell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo

... Show More
View Publication
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref