The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
A ‘locking-bolt’ demountable shear connector (LBDSC) is proposed to facilitate the deconstruction and reuse of steel-concrete composite structures, in line with achieving a more sustainable construction design paradigm. The LBDSC is comprised of a grout-filled steel tube and a geometrically compatible partially threaded bolt. The latter has a geometry that ‘locks’ the bolt in compatible holes predrilled on the steel flange and eliminates initial slip and construction tolerance issues. The structural behaviour of the LBDSC is evaluated through nine pushout tests using a horizontal test setup. The effects of the tube thickness, strength of concrete slab, and strength of infilled grout on the shear resistance, initial stiffness, and du
... Show MoreRheumatoid arthritis is a chronic, progressive, inflammatory autoimmune disease of unidentified etiology, associated with articular, extra-articular and systemic manifestation that require long-standing treatment. Taking patient’s beliefs about the prescribed medication in consideration had been shown to be an essential factor that affects adherence of the patient in whom having positive beliefs is an essential for better adherence. The purpose of the current study was to measure beliefs about medicines among a sample of Iraqi patients with Rheumatoid arthritis and to determine possible association between this belief and some patient-certain factors. This study is a cross-sectional study carried out on 250 already diagnosed rheumatoid
... Show Moreplanning is among the most significant in the field of robotics research. As it is linked to finding a safe and efficient route in a cluttered environment for wheeled mobile robots and is considered a significant prerequisite for any such mobile robot project to be a success. This paper proposes the optimal path planning of the wheeled mobile robot with collision avoidance by using an algorithm called grey wolf optimization (GWO) as a method for finding the shortest and safe. The research goals in this study for identify the best path while taking into account the effect of the number of obstacles and design parameters on performance for the algorithm to find the best path. The simulations are run in the MATLAB environment to test the
... Show MoreA substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreLightweight concrete-filled tube (CFST) columns offer numerous benefits, such as reduced weight, enhanced resistance to buckling, improved structural performance, and the ability to endure cyclic loading. This study considered key research on the structural behavior of CFST columns, covering various topics, including lightweight concrete, methods of concrete placement within steel tubes, and CFST columns with and without shear connectors. The literature review reveals that while several researchers have explored the use of shear connectors as a load-transfer mechanism in CFST columns, there is no consensus on the design methodology for connector resistance. Shear connectors signifi
Recent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p
... Show More