The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modified to achieve QoS using Artificial Intelligence (AI) and machine learning (ML). Developing an intelligent decision-making system for network management and reducing network slice failures requires reconfigurable wireless network solutions with machine learning capabilities. Using Spiking Neural Network (SNN) and prediction, we have developed a 'Buffer-Size Management' model for controlling network load efficiency by managing the slice's buffer size. To analyze incoming traffic and predict the network slice buffer size; our proposed Buffer-Size Management model can intelligently choose the best amount of buffer size for each slice to reduce packet loss ratio, increase throughput to 95% and reduce network failure by about 97%.
Home Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad
... Show MoreThe paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreClassification of imbalanced data is an important issue. Many algorithms have been developed for classification, such as Back Propagation (BP) neural networks, decision tree, Bayesian networks etc., and have been used repeatedly in many fields. These algorithms speak of the problem of imbalanced data, where there are situations that belong to more classes than others. Imbalanced data result in poor performance and bias to a class without other classes. In this paper, we proposed three techniques based on the Over-Sampling (O.S.) technique for processing imbalanced dataset and redistributing it and converting it into balanced dataset. These techniques are (Improved Synthetic Minority Over-Sampling Technique (Improved SMOTE), Border
... Show MoreAn experimental analysis was included to study and investigate the mass transport behavior of cupric ions reduction as the main reaction in the presence of 0.5M H2SO4 by weight difference technique (WDT). The experiments were carried out by electrochemical cell with a rotating cylinder electrode as cathode. The impacts of different operating conditions on mass transfer coefficient were analyzed such as rotation speeds 100-500 rpm, electrolyte temperatures 30-60 , and cupric ions concentration 250-750 ppm. The order of copper reduction reaction was investigated and it shows a first order reaction behavior. The mass transfer coefficient for the described system was correlated with the aid of dimensionless groups as fo
... Show MoreAbstract
The aim of this study was to prepare rebamipide ocular inserts in order to extend its release on the ocular surface for dry eye treatment. Solubility study was applied to the drug with or without l-arginine using different solvents. Solvent casting technique was used to prepare the inserts; l-arginine was used to solubilize the drug, hydroxypropyl methylcellulose grades (E5 and K15M) and poly ethylene glycol 200 were used as excipients. The inserts were evaluated for their physical and mechanical properties, moisture loss% and absorption %, surface pH, and in-vitro drug release. The use l-arginine exhibited an enhancement of rebamipide solubility in both deionized water and phosphate buffer (pH 7.4) by a
... Show MoreAn optical video communication system is designed and constructed using pulse frequency modulation (PFM) technique. In this work PFM pulses are generated at the transmitter using voltage control oscillator (VCO) of width 50 ns for each pulse. Double frequency, equal width and narrow pulses are produced in the receiver be for demodulation. The use of the frequency doubling technique in such a system results in a narrow transmission bandwidth (25 ns) and high receiver sensitivity.
The digital camera which contain light unit inside it is useful with low illumination but not for high. For different intensity; the quality of the image will not stay good but it will have dark or low intensity so we can not change the contrast and the intensity in order to increase the losses information in the bright and the dark regions. . In this search we study the regular illumination on the images using the tungsten light by changing the intensities. The result appears that the tungsten light gives nearly far intensity for the three color bands(RGB) and the illuminated band(L).the result depend on the statistical properties which represented by the voltage ,power and intensities and the effect of this parameter on the digital
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More