The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
This research seeks to attempt to reveal the intention of Al-Hafiz Al-Mazi from his market to hadiths from Imam Ahmad’s Musnad in his book “Masterpiece of Supervision in Knowing the Parties”, and researchers know that this book was classified by Al-Mazi to collect the parties to the six books: Sahih Al-Bukhari, Sahih Muslim, Sunan Abi Dawud, Jamea Al-Tirmidhi and Sunan Al-Nasa’i and Sunan Ibn Majah, in addition to some of the books ’authors’ books, and arranging them according to the Musnad, and it is not Musnad Ahmad from his condition, even if it is close to the arrangement of Mazi’s work, as he was a follower of that to the original owner Abu al-Qasim bin Asaker in his book “Supervising Knowledge of the Parties” in M
... Show MorePraise be to God, we praise Him, we seek His help, we seek His forgiveness, and we seek refuge in God from the evils of ourselves and our bad deeds. . The marriage contract, like other contracts, gives rise to reciprocal rights and duties that bind both the husband and the wife, pursuant to the principle of balance, equivalence, and the equality of the parties to the contract on which every contract is based. . That is, women have rights over men similar to what men have over women, or that the basis for estimating these rights and duties is custom based on the nature of both men and women. The Iraqi Personal Status Law stipulates all the financial rights that the wife is entitled to from her husband: namely, the dowry and alimony. As fo
... Show MoreAnd after:
There are many aspects of inference in the Holy Qur’an, whether it is evidence, evidence, argument, authority, or proof.
These expressions or expressions are close in meaning to each other in appearance, but the Qur’an used them all in their exact place, so every word in the Qur’an has its own use that was set for it, and no other word can replace it even if it is close in meaning to it. And these aspects that the Qur’an mentioned as evidence for the aspects of inference in it may come to be mental, textual, or tactile evidence.
The Qur’an exalted the importance of evidence and proof in its religion, and entrusted it with confirming and rejecting the plaintiff’s claim, regardless of its subject matter
This study is based on the basic idea: that human communication does not stop at the limits of words spoken, but extends to include the movements of the body and its members, such as the face, hand, eye, hearing, touch, taste, sensation and the public body.
The human movements represented by polarization, frowns, tattoos, and movements are all auxiliary tools that reach meanings and affect others greatly.
Perhaps their importance is also in their ability to translate what is going on in the soul, and to show it to the outside body members, without the control of the human in many cases, it is thus an important factor in the process of human communication.
The purpose of this study is to show the senses of the senses in the
The current research aims to evaluate the level of inclusive leadership within the General Secretariat for the Council of Ministers, and its role in achieving integration in work through the need to improve relationships between different administrative levels, facilitate participation, expression of opinions, and belonging to the organization. In order to achieve the research objective, the descriptive analytical statistical method was chosen using the SPSS V.25 programs, with various statistical methods and measures, including mean, standard deviation, variance coefficient, relative importance, and simple regression, through a questionnaire tool for data collection. The research community included the leadership in the sample of resear
... Show More
The research aims to study the impact of the dimensions of fun in the workplace in achieving internal marketing And knowing the type of relationships That link the dimensions of fun in the workplace With each other, None of the researchers mentioned (to the researcher's knowledge) the link between fun in the workplace and internal marketing From this point of view the main objective is determined, which is to study the effect of fun in the workplace in internal marketing, The research was conducted at Al Salam Public Company for Communications and Information Technology The research community was represented by (308) employees of the aforementioned company , Where a random sample was selected tha
... Show MoreTarget tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr
... Show MoreThe condition of Islam and Muslims and what their political, social, cultural and educational status, and even religious and faith status, has led to whoever feels his belonging to this great religion and that middle nation, to try as much as he can to fix what has been corrupted as much as he can, and perhaps in diagnosing illness and illness as It was said half the way to treatment, and from this standpoint I liked to occupy thought, work consideration and harness part of the youth’s life in order to reach what contributes to reforming the situation and the safety of generations, and this is only in seeking knowledge and learning it by following the guidance of the Messenger (r) and his companions ( y) Therefore, the subject of my re
... Show MoreThis paper performance for preparation and identification of six new complexes of a number of transition metals Cr (lII), Mn (I1), Fe (l), Co (II), Ni (I1), Cu (Il) with: N - (3,4,5-Trimethoxy phenyl-N - benzoyl Thiourea (TMPBT) as a bidentet ligand. The prepared complexes have been characterized, identified on the basis of elemental analysis (C.H.N), atomic absorption, molar conductivity, molar-ratio ,pH effect study, I. Rand UV spectra studies. The complexes have the structural formula ML2X3 for Cr (III), Fe (III), and ML2X2 for Mn (II), Ni (II), and MLX2 for Co (Il) , Cu (Il).
In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai
... Show More