The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
A rapid, sensitive and selective spectrophotometric method was developed for determination of sulfathiazole (STHZ) in aqueous solution. The method is based on the oxidative coupling reaction with 2,4-dinitrophenylhydrazine (2,4-DNPH) in a basic medium (pH 10.9) in the presence of potassium periodate to produce an intense orange colour, soluble in water , stable product and absorbs at 492 nm. Beer's law was in the linear range 2.0-28.0 μg/ml of sulfathiazole, the molar absorptivity, Sandellʼs sensitivity index and detection limit were 1.1437 ×104 liter. mol-1.cm-1,0.0223 μg.cm-2 and 0.1274 μg/ml respectively. The RSD value was 0.75 - 1.12 % depending on the concentration. This method was applied successfu
... Show MoreProbiotics are live microbes that give many health benefits to human beings and animals, the most studied and commonly used probiotics are Gram-positive bacteria; lactobacilli and bifidobacteria. At nowadays, Lactobacillus spp. constitute more than two-thirds of the total numbers of probiotic species. The present study aimed to characterize Lactobacillus that locally isolated from human mouth and feces as probiotics. A total of three Lactobacillus isolates; Lactobacillus fermentum Lb2, Lactobacillus rhamnosus Lb9, and Lactobacillus paracasei Lb10 were investigated in respect to acid and bile salts tolerance, antibiotics susceptibility, and cell surface hydrophobicity in vitro using bacterial adhesion to hydrocarbons method. In compa
... Show MoreRecently times, industrial development has increased, including plastic industries, and since plastic has a very long analytical life, it will cause environmental pollution. Therefore studies have resorted to reusing recycled plastic waste (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, some studies were reviewed and then summarized into several things, including the percentage of plastic replacement from the aggregate and the effect of this percentage on the fresh properties of concrete, such as the workability and the effect of plastic waste on the hardening properties of concrete such as dry density, compressive, tensile and flexural strength.
This research is a critical methodological study deals with some Quranic verses abrogative,abrogated.
by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the in the holy Quraan.
DBNRAHA Hameed, IJRSSH PUBLICATION, 2018
Television culture has become the most dangerous of our time. It manipulates with minds and hearts together; and forms consciousness. It transforms societies into actual forces rejecting certain principles by guiding the media landscape through visible connotations acceptable to the public; or provokes the citizen against elements that put a burden on the viewer or the public in order to create a positive reaction to the subject of combating terrorism by combining these ads in line with what the public wants of security and tranquility and a decent living after suffering from terrorism in the past years.
Therefore, this research deals with television advertisements as one of the most important fo
... Show MoreDell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo
... Show MoreSteganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re
... Show More