Preferred Language
Articles
/
joe-731
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link). Based on simulation results, it is concluded that the second method consumes less time (lower transmission delay) than the first method. The delay consumed by the second method is half the delay in the first method. Also, the packet loss rate for second method is 14%, while 16% in the first method. The jitter for second method is almost similar to the jitter without link fail. Therefore, the second method led to select the path with small losses without impact on video quality. Finally, the results of two methods  are compared in terms of end to end delay, packet loss rate, and jitter.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Thu Dec 01 2011
Journal Name
Iraqi Journal Of Physics
Electronic diagnostics system for the analysis of laser beam profile
...Show More Authors

In this work the analysis of laser beam profile system ,using a two dimensional CCD (Charge Coupled Device) arrays, is established. The system is capable of producing video graphics that give a two dimensional image of laser beam. The video graphics system creates color distribution that represent the intensity distribution of the laser beam or the energy profile of the beam. The software used is capable of analyzing and displaying the profile in four different methods that is , color code intensity contouring , intensity shareholding, intensity cross section along two dimension x-y, and three dimensional plot of the beam intensity given in the same display.

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Adaptive Sliding Mode Controller for Servo Actuator System with Friction
...Show More Authors

This paper addresses the use of adaptive sliding mode control for the servo actuator system with friction. The adaptive sliding mode control has several advantages over traditional sliding mode control method. Firstly, the magnitude of control effort is reduced to the minimal admissible level defined by the conditions for the sliding mode to exist. Secondly, the upper bounds of uncertainties are not required to be known in advance. Therefore, adaptive sliding mode control method can be effectively implemented. The numerical simulation via MATLAB 2014a for servo actuator system with friction is investigated to confirm the effectiveness of the proposed robust adaptive sliding mode control scheme. The results clarify, after

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of The Mechanical Behavior Of Materials
Transient response and performance of prestressed concrete deep T-beams with large web openings under impact loading
...Show More Authors
Abstract<p>This study reports testing results of the transient response of T-shape concrete deep beams with large openings due to impact loading. Seven concrete deep beams with openings including two ordinary reinforced, four partially prestressed, and one solid ordinary reinforced as a reference beam were fabricated and tested. The effects of prestressing strand position and the intensity of the impact force were investigated. Two values for the opening’s depth relative to the beam cross-section dimensions were inspected under the effect of an impacting mass repeatedly dropped from different heights. The study revealed that the beam’s transient deflection was increased by about 50% with gre</p> ... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Iraqi Journal Of Oil And Gas Research (ijogr)
Comparative study of electrochemical oxidation system hybrid with photocatalytic system for the treatment of Al-Najaf petroleum refinery wastewater
...Show More Authors

View Publication
Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Engineering, Technology &amp; Applied Science Research
Numerical Modeling of a Pile Group Subjected to Seismic Loading Using the Hypoplasticity Model
...Show More Authors

Various simple and complicated models have been utilized to simulate the stress-strain behavior of the soil. These models are used in Finite Element Modeling (FEM) for geotechnical engineering applications and analysis of dynamic soil-structure interaction problems. These models either can't adequately describe some features, such as the strain-softening of dense sand, or they require several parameters that are difficult to gather by conventional laboratory testing. Furthermore, soils are not completely linearly elastic and perfectly plastic for the whole range of loads. Soil behavior is quite difficult to comprehend and exhibits a variety of behaviors under various circumstances. As a result, a more realistic constitutive model is

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Thu Dec 15 2022
Journal Name
Engineering, Technology & Applied Science Research (etasr)
Numerical Modeling of a Pile Group Subjected to Seismic Loading Using the Hypoplasticity Model
...Show More Authors

Various simple and complicated models have been utilized to simulate the stress-strain behavior of the soil. These models are used in Finite Element Modeling (FEM) for geotechnical engineering applications and analysis of dynamic soil-structure interaction problems. These models either can't adequately describe some features, such as the strain-softening of dense sand, or they require several parameters that are difficult to gather by conventional laboratory testing. Furthermore, soils are not completely linearly elastic and perfectly plastic for the whole range of loads. Soil behavior is quite difficult to comprehend and exhibits a variety of behaviors under various circumstances. As a result, a more realistic constitutive model is

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Jun 23 2022
Journal Name
American Scientific Research Journal For Engineering, Technology, And Sciences
A Review of TCP Congestion Control Using Artificial Intelligence in 4G and 5G Networks
...Show More Authors

In recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne

... Show More
View Publication
Publication Date
Tue Oct 01 2019
Journal Name
2019 12th International Conference On Developments In Esystems Engineering (dese)
Roadway Deterioration Prediction Using Markov Chain Modeling (Wasit Governorate/ Iraq as a Case Study)
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref