Preferred Language
Articles
/
joe-1428
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 31 2012
Journal Name
College Of Islamic Sciences
The hadiths that al-Mazy cited in his book "Tuhfat al-Ashraf" from the Imam Ahmad Imam's collection and study
...Show More Authors

This research seeks to attempt to reveal the intention of Al-Hafiz Al-Mazi from his market to hadiths from Imam Ahmad’s Musnad in his book “Masterpiece of Supervision in Knowing the Parties”, and researchers know that this book was classified by Al-Mazi to collect the parties to the six books: Sahih Al-Bukhari, Sahih Muslim, Sunan Abi Dawud, Jamea Al-Tirmidhi and Sunan Al-Nasa’i and Sunan Ibn Majah, in addition to some of the books ’authors’ books, and arranging them according to the Musnad, and it is not Musnad Ahmad from his condition, even if it is close to the arrangement of Mazi’s work, as he was a follower of that to the original owner Abu al-Qasim bin Asaker in his book “Supervising Knowledge of the Parties” in M

... Show More
View Publication Preview PDF
Publication Date
Wed May 24 2023
Journal Name
College Of Islamic Sciences
The wife's alimony in Sharia and law
...Show More Authors

Praise be to God, we praise Him, we seek His help, we seek His forgiveness, and we seek refuge in God from the evils of ourselves and our bad deeds. . The marriage contract, like other contracts, gives rise to reciprocal rights and duties that bind both the husband and the wife, pursuant to the principle of balance, equivalence, and the equality of the parties to the contract on which every contract is based. . That is, women have rights over men similar to what men have over women, or that the basis for estimating these rights and duties is custom based on the nature of both men and women. The Iraqi Personal Status Law stipulates all the financial rights that the wife is entitled to from her husband: namely, the dowry and alimony. As fo

... Show More
View Publication Preview PDF
Publication Date
Wed May 24 2023
Journal Name
College Of Islamic Sciences
Proof and its inferences in the Qur'an
...Show More Authors

And after:

There are many aspects of inference in the Holy Qur’an, whether it is evidence, evidence, argument, authority, or proof.
These expressions or expressions are close in meaning to each other in appearance, but the Qur’an used them all in their exact place, so every word in the Qur’an has its own use that was set for it, and no other word can replace it even if it is close in meaning to it. And these aspects that the Qur’an mentioned as evidence for the aspects of inference in it may come to be mental, textual, or tactile evidence.
The Qur’an exalted the importance of evidence and proof in its religion, and entrusted it with confirming and rejecting the plaintiff’s claim, regardless of its subject matter

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Al–bahith Al–a'alami
Semiotics of Senses in the Holy Quran
...Show More Authors

This study is based on the basic idea: that human communication does not stop at the limits of words spoken, but extends to include the movements of the body and its members, such as the face, hand, eye, hearing, touch, taste, sensation and the public body.
The human movements represented by polarization, frowns, tattoos, and movements are all auxiliary tools that reach meanings and affect others greatly.
 Perhaps their importance is also in their ability to translate what is going on in the soul, and to show it to the outside body members, without the control of the human in many cases, it is thus an important factor in the process of human communication.
The purpose of this study is to show the senses of the senses in the

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Inclusive leadership in the General Secretariat for the Council of Ministers - An analytical research
...Show More Authors

The current research aims to evaluate the level of inclusive leadership within the General Secretariat for the Council of Ministers, and its role in achieving integration in work through the need to improve relationships between different administrative levels, facilitate participation, expression of opinions, and belonging to the organization. In order to achieve the research objective, the descriptive analytical statistical method was chosen using the SPSS V.25 programs, with various statistical methods and measures, including mean, standard deviation, variance coefficient, relative importance, and simple regression, through a questionnaire tool for data collection. The research community included the leadership in the sample of resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The impact of fun in the workplace In achieving internal marketing (Applied research)
...Show More Authors

 

    The research aims to study the impact of the dimensions of fun in the workplace in achieving internal marketing And knowing the type of relationships That link the dimensions of fun in the workplace With each other, None of the researchers mentioned (to the researcher's knowledge) the link between fun in the workplace and internal marketing From this point of view the main objective is determined, which is to study the effect of fun in the workplace in internal marketing, The research was conducted at Al Salam Public Company for Communications and Information Technology The research community was represented by (308) employees of the aforementioned company , Where a random sample was selected tha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 07 2016
Journal Name
Fourth International Conference On Wireless And Optical Communications, 2016, Beijing, China
ESAM: Endocrine inspired Sensor Activation Mechanism for multi-target tracking in WSNs
...Show More Authors

Target tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocr

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed May 17 2023
Journal Name
College Of Islamic Sciences
The methods used by the Prophet in teaching the Companions
...Show More Authors

The condition of Islam and Muslims and what their political, social, cultural and educational status, and even religious and faith status, has led to whoever feels his belonging to this great religion and that middle nation, to try as much as he can to fix what has been corrupted as much as he can, and perhaps in diagnosing illness and illness as It was said half the way to treatment, and from this standpoint I liked to occupy thought, work consideration and harness part of the youth’s life in order to reach what contributes to reforming the situation and the safety of generations, and this is only in seeking knowledge and learning it by following the guidance of the Messenger (r) and his companions ( y) Therefore, the subject of my re

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESISAND STUDY OF THE COMPLEXES OF: N-(3,4,5-TRIMETHOXY PHENYL)-N- BENZOYL THIOUREA (TMPBT) WITH A NUMBER OF TRANSITION METALS AND THEIR INDUSTRIAL AND MEDICAL IMPORTANCE: SYNTHESISAND STUDY OF THE COMPLEXES OF: N-(3,4,5-TRIMETHOXY PHENYL)-N- BENZOYL THIOUREA (TMPBT) WITH A NUMBER OF TRANSITION METALS AND THEIR INDUSTRIAL AND MEDICAL IMPORTANCE
...Show More Authors

This paper performance for preparation and identification of six new complexes of a number of transition metals Cr (lII), Mn (I1), Fe (l), Co (II), Ni (I1), Cu (Il) with: N - (3,4,5-Trimethoxy phenyl-N - benzoyl Thiourea (TMPBT) as a bidentet ligand. The prepared complexes have been characterized, identified on the basis of elemental analysis (C.H.N), atomic absorption, molar conductivity, molar-ratio ,pH effect study, I. Rand UV spectra studies. The complexes have the structural formula ML2X3 for Cr (III), Fe (III), and ML2X2 for Mn (II), Ni (II), and MLX2 for Co (Il) , Cu (Il).

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus