Preferred Language
Articles
/
joe-1821
Automatic Spike Neural Technique for Slicing Bandwidth Estimated Virtual Buffer-Size in Network Environment
...Show More Authors

The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modified to achieve QoS using Artificial Intelligence (AI) and machine learning (ML). Developing an intelligent decision-making system for network management and reducing network slice failures requires reconfigurable wireless network solutions with machine learning capabilities. Using Spiking Neural Network (SNN) and prediction, we have developed a 'Buffer-Size Management' model for controlling network load efficiency by managing the slice's buffer size. To analyze incoming traffic and predict the network slice buffer size; our proposed Buffer-Size Management model can intelligently choose the best amount of buffer size for each slice to reduce packet loss ratio, increase throughput to 95% and reduce network failure by about 97%.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Functionalized multi-walled carbon nanotubes network sensor for NO2 gas detection at room temperature
...Show More Authors

View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Test the effectiveness of transactional and transformational leadership in the Egyptian Environment
...Show More Authors

       The present study aims to test a range of hypotheses about the effectiveness of each of the theory of transactional leadership, and the theory of transformational leadership in the Egyptian environment, and to identify any of them are better able to predict the effectiveness of leadership. And after the effect will be to identify the quality of the relationship between the leader and the subordinate in leadership , and what is the role of transformational leadership dimensions influencing the effectiveness of leadership. The field study was conducted on a sample of companies' public and private sector and the government in Egypt. The results of the study resulted in experimental that transacti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 06 2022
Journal Name
Advances In Systems Science And Applications
Stability and Bifurcation of a Delay Cancer Model in the Polluted Environment
...Show More Authors

It is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul

... Show More
View Publication
Scopus (2)
Scopus
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Physical Work Environment in The Flexibility of Industrial Operations
...Show More Authors

he research specifies important subjects which contribute in improvement of productive performance in industrial companies through study and analysis of relationships and effect between dimensions of physical work environment and industrial operations flexibility in the leathers industries company. To reach these goals the information are collected is questionnaire prepared for this purpose as a tool to analyze the practical results and are recorded for a sample of 118 persons from employees. The research uses the statistical methods and analyzes the information by using SPSS system. The research reached to many conclusions; the important one is the weakness of the company to make in to account the physical envir

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 08 2023
Journal Name
International Journal Of Scientific Trends
The Role of Renewable Energy in the Protection of the Iraqi Environment
...Show More Authors

In this article, the types of renewable energies and the environmental effects of consuming these energies are studied. Energy is one of the things necessary for economic and social development and improving the quality of life, and the presence of continuous and sustainable economic energy is essential for any economic development and growth. Humankind has been aware of renewable energies such as biomass and geothermal energy for a long time and has used these energies as heat sources for shelter. With the beginning of the extraction of fossil fuels such as oil and coal and unlimited access to these products, the use of renewable energy sources, except in remote places and forest areas, has become limited and forgotten. Currently in Iraq,

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Place dependence as the physical environment role function in the place attachment
...Show More Authors
Abstract<p>This research sheds light on the physical environment role in creating the place attachment, by discussing one of the important factors in the attachment creation, it is the concept place dependence, consisting of two important dimensions: the place quality and the place expectation; they contain a number of the supporter physical environment sub-indicators for place attachment. Eight physical indicators were reached; they were found to have a close relationship to the place attachment, including: the open and green spaces existence, land use diversity, diversity of housing types, dwelling / population density, accessibility, transport network development degree, transport multiple mo</p> ... Show More
View Publication
Scopus (17)
Crossref (11)
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
International Journal Of Engineering Pedagogy (ijep)
E-learning in the Cloud Computing Environment: Features, Architecture, Challenges and Solutions
...Show More Authors

The need to constantly and consistently improve the quality and quantity of the educational system is essential. E-learning has emerged from the rapid cycle of change and the expansion of new technologies. Advances in information technology have increased network bandwidth, data access speed, and reduced data storage costs. In recent years, the implementation of cloud computing in educational settings has garnered the interest of major companies, leading to substantial investments in this area. Cloud computing improves engineering education by providing an environment that can be accessed from anywhere and allowing access to educational resources on demand. Cloud computing is a term used to describe the provision of hosting services

... Show More
View Publication
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction in One of Iraqi Carbonate Reservoir Using Hydraulic Flow Units and Neural Networks
...Show More Authors

Permeability determination in Carbonate reservoir is a complex problem, due to their capability to be tight and heterogeneous, also core samples are usually only available for few wells therefore predicting permeability with low cost and reliable accuracy is an important issue, for this reason permeability predictive models become very desirable.

   This paper will try to develop the permeability predictive model for one of  Iraqi carbonate reservoir from core and well log data using the principle of Hydraulic Flow Units (HFUs). HFU is a function of Flow Zone Indicator (FZI) which is a good parameter to determine (HFUs).

   Histogram analysis, probability analysis and Log-Log plot of Reservoir Qua

... Show More
View Publication Preview PDF