Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable results comparing with others. Computer simulation has been performed to study and verify the above mechanisms in the performance enhancement using the OPNET simulator.
Abstract
The current research aims to identify the communicative competence of university students, to identify the levels of communicative competence among university students and which of these levels are more common, and to identify the significance of differences in communicative competence among university students according to the variables of gender and specialization. The study population consisted of (782) male and female students, as the statistical analysis sample was limited to (400) male and female students to extract the psychometric properties of the current research tool. The study sample included (382) male and female students at the University of Baghdad who were chosen by the stratified random
... Show MoreDiyala Governorate was recently exposed to high flood waves discharged from Hemrin Dam. Since the dam was at its full capacity during the flood period, these waves were discharged to the Diyala River. Because of the reduction in Diyala River capacity to 750m3/s, the cities and villages on both sides of the river banks were inundated. Thus, the study's objective is to design a flood escape out of the Diyala River, to discharge the flood wave through it. The flood escape simulation was done by using HEC- RAS software. Two hundred twenty-three cross sections for the escape and 30 cross-sections of the Diyala River were used as geometric data. Depending on the geological formation that the escape passed t
... Show MoreIn contemporary discourses the debate of most Western thinkers is about the efforts to clarify the normative foundations of democracy. And then, some political thinkers have adopted other models differ in terms of standards for traditional liberal democracy. Be the common goal of democracy will give the formation of a greater role than usual in political liberalism rather than limiting the participatory activity of citizens on the function to give permanent legitimacy to the exercise of state authority. The activity is to be permanently enshrined in the democratic public sphere and the issue must be understood as the source of all political decisions.
This research aims at identifying the level of Reflective Judgment for University students in term of gender and stage. To this end, the researcher used Khaleel's scale (2016) for the Reflective Judgment. The scale was administered to the sample of the study which is (200) male and female level first-fourth university students. The results have shown that university students are on the level five of the Reflective Judgment, and the first-stage students have reflective judgment more than fourth-stage students. In the light of these results, the researcher has come with a number of recommendations and suggestions.
نشاطات فرع الدراسات الدولية
The reclamation of makeup water is studied in terms of breakthrough time (i.e., the leakage of the cations). Makeup water was subjected to lab-scale ion exchangers of two types: strong acid cation and weak base anion exchanger. The experimental investigation was directed to study the ion exchanger performance in terms of four different parameters (i.e., copper concentration, total dissolved solids (TDS), feed rate and bed depth). Box-Wilson composite rotatable design was adopted in designing the experiments. Breakthrough times of the effluent stream are measured in terms of copper concentration of 2 to 25 ppm, TDS concentration of 250 to 1250 ppm, feed rate of 0.38 to 5.34 l/h and bed depth of 5 to 70 cm. Simulation the effect of the stu
... Show MoreThe objective behind this work was to find out the bacteriological profile of post burn infections in wound. The study was carried out from December 2010 to February 2011 at the Burns Unit of Al –Kindy Hospital and Al-Yarmook Hospital in Baghdad. Sixty burn patients have been investigated for bacterial profile of burn wound infections. Specimens were collected in the form of wound swabs. The organisms were isolated and identified by standard microbiological methods. Antimicrobial susceptibility test has been done by ATB-PSE5 kit(BioMereiux). Pseudomonas aeruginosa 35(58.3 %) was found to be the most common isolate followed by Klebsiella pneumonae 10(16.6%), Staphylococcus aureus 7(10%). ,E.coli 3(5%), Proteus merabilis 1(1.6 %), others 2
... Show MoreThe subject of multi- ethnics is one of the most important subjects in the study of political
geography, as multi- ethnics and its consequent problems are global geopolitical phenomena
that started early and reached its peak with the beginning of the twentieth century, because of
major changes in the political landscape that resulted by wars and led to the collapse of many
empires and major powers, a matter which led to put new political maps according to certain
considerations of the colonial powers, especially in Africa and Asia. All these things led to
the most serious challenges based on ethnic and sectarian conflict and led to the development
of geopolitical problems. Among the examples what most countries in th
Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show More