Preferred Language
Articles
/
joe-1657
Intelligent Congestion Control of 5G Traffic in SDN using Dual-Spike Neural Network
...Show More Authors

Software Defined Networking (SDN) with centralized control provides a global view and achieves efficient network resources management. However, using centralized controllers has several limitations related to scalability and performance, especially with the exponential growth of 5G communication. This paper proposes a novel traffic scheduling algorithm to avoid congestion in the control plane. The Packet-In messages received from different 5G devices are classified into two classes: critical and non-critical 5G communication by adopting Dual-Spike Neural Networks (DSNN) classifier and implementing it on a Virtualized Network Function (VNF). Dual spikes identify each class to increase the reliability of the classification. Different metrics have been adopted to evaluate the proposed classifier's effectiveness: accuracy, precision, recall, Matthews Correlation Coefficient (MCC), and F1-Score. Compared with a convolutional neural network (CNN), the simulation results confirmed that the DSNN model could enhance traffic classification accuracy by 5%. The efficiency of the priority model also has been demonstrated in terms of Round Trip Time (RTT).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The 31th Minisymposium
Towards the Requirement-Driven Generation and Evaluation of Hyperledger Fabric Network Designs
...Show More Authors

View Publication
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Independent Thermal Network Through Thermal Synergy Between Four Architectural Units
...Show More Authors

The manifestations of climate change are increasing with the days: sudden rains and floods, lakes that evaporate, rivers that experience unprecedentedly low water levels, and successive droughts such as the Tigris, Euphrates, Rhine, and Lape rivers. At the same time, energy consumption is increasing, and there is no way to stop the warming of the Earth's atmosphere despite the many conferences and growing interest in environmental problems. An aspect that has not received sufficient attention is the tremendous heat produced by human activities. This work links four elements in the built environment that are known for their high energy consumption (houses, supermarkets, greenhouses, and asphalt roads) according t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
A specimen of the internal control system on the stock in light of the application JIT system In construction companies
...Show More Authors

Suffer most of the facilities of the high cost of inventory , which affects the high cost of the product and thus affects many administrative decisions , as well as suffer the facilities of the systems developed by the provisions of inventory control , and this problem is exacerbated in the construction sector where the inventory in the form of Construction spin of the Year for another it becomes difficult to control the cost effectively , and is the research problem in question follows: What are the implications of the use of the system in time inventory accounting system for the contracting company does kills Alrkaah to the provisions of the cost of inventory and what is the optimal approach to inventory control ? Find assumed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Evaluate the effectiveness of internal control systems and their role in providing an effective governance framework in Sudanese banks
...Show More Authors

   The study aimed to find out the relationship between the dimensions of internal control systems and the availability of an effective governance framework in the Sudanese banks. The study used descriptive and analytical method for collecting and analyzing the study data using SPSS program. The questionnaire was used as an analysis tool. The target sample of Sudanese bank employees, the study found several results, including that the bank avoids methods that lead to the rational use of available resources, and identifies and separation of tasks among employees, in addition to rapid response to reports The study found several recommendations, including the need for a list of banks that are sufficiently flexible and comp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Ecology
Effectiveness of oxidation enzymes in the ratio of gluten to wheat bread via different treatments of weeds control
...Show More Authors

Scopus (11)
Scopus
Publication Date
Thu Nov 17 2016
Journal Name
Plos One
Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network
...Show More Authors

Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2015
Journal Name
2015 Ieee Congress On Evolutionary Computation (cec)
Differential evolution with adaptive repository of strategies and parameter control schemes
...Show More Authors

A new Differential Evolution (ARDE) algorithm is introduced that automatically adapt a repository of DE strategies and parameters adaptation schemes of the mutation factor and the crossover rate to avoid the problems of stagnation and make DE responds to a wide range of function characteristics at different stages of the evolution. ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. Then a new adaptive procedure called adaptive repository (AR) has been developed to select the appropriate combinations of the JADE strategies and the parameter control schemes of the MDE_pBX to generate the next population based on their fitness values. Experimental results have been presented to confirm the reli

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Life – Style of patients with peptic ulcer A case control study
...Show More Authors

Abstract A descriptive (retrospective) (a case-control) study was carried out at Al-Karama Teaching Hospital, Baghdad Teaching Hospital and Surgical Specialties Hospital, and Gastro-Intestinal Tract and Liver (GIT) Hospital for the period of December 1st, 2001 To March 15th 2002. To identify aspects of life-style that may contribute to the occurrence of peptic ulcer (P.U)as risk factors. And to find out the relationship between the demographic characteristic of the group. Non-probability (Purposive) sample of (100) cases who were admitted to the endoscopy department who were later on diagnosed as having

... Show More
View Publication Preview PDF