Preferred Language
Articles
/
joe-2171
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the subnet ID, broadcast ID, usable addresses for sub networks and others). The simulator also includes the ability to draw a suggested network topology that matches the entries. The implementation of the simulation required only very few entries (IP, prefix and number of subnets).This simulator is useful for students, instructors, and network engineers to analysis and design a VLSM network by providing all required information in simple, fast and easy steps. Moreover, the software draws a full detailed suggested network topology which is considered a helpful tool for the network administrator that he should have.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 04 2021
Journal Name
Neuroquantology
Nanotechnology and the Most Important Characterization Techniques for Nanomaterial's: A Review
...Show More Authors

Due to the importance of nanotechnology because of its features and applications in various fields, it has become the focus of attention of the world and researchers. In this study, the concept of nanotechnology and nanomaterials was identified, the most important methods of preparing them, as well as the preparation techniques and the most important devices used in their characterization.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Mathematics In Operational Research
A single server fuzzy queues with priority and unequal service rates
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Russian Journal Of Bioorganic Chemistry
A Brief Review on Schiff Base, Synthesis, and Their Antimicrobial Activities
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
A Hybrid Meta-Heuristic Approach for Test Case Prioritization and Optimization
...Show More Authors

The application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Eyes Drugs and Treatment at Ibn al –Haytham: A Historical Study
...Show More Authors

            Ibn al-Haytham is the pioneer of optics, which is a science that had described optics circumstances. Optics or landscape science as it was known by the Arab and Muslim scientists at the time when  is a science known as the conditions of sighters in their quantity and quality as the proximity and distance from the beholder , the different forms , conditions and what mediate between the beholder and the microscopes , to explain useful knowledge of what obscures the sight of the conditions of sighters and is used to measure the space Distant criminality and  mirrors.

Ibn al-Haitham wrote his famous book The Book of Mirrors and studied mistakes adopted the m

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (43)
Crossref (36)
Scopus Clarivate Crossref
Publication Date
Fri Mar 12 2021
Journal Name
Sensors
A Robust Handwritten Numeral Recognition Using Hybrid Orthogonal Polynomials and Moments
...Show More Authors

Numeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a

... Show More
View Publication
Scopus (31)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Thu Dec 19 2024
Journal Name
Ieee Explorer
A Novel Flow Priority and Continuity Control Mechanism in SDN Network
...Show More Authors

In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate p

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Artificial Intelligence and Trends Using in Sustainability Audit: A Bibliometric Analysis
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
International Journal Of Drug Delivery Technology
Gold nanoparticle: Synthesis, functionalization, enhancement, drug delivery and therapy: A review
...Show More Authors

Scopus (22)
Scopus