Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable results comparing with others. Computer simulation has been performed to study and verify the above mechanisms in the performance enhancement using the OPNET simulator.
The herbal remedy individually or in combination with standard medicines has been used in diverse medical treatises for the cure of different diseases. Pumpkin seed oil is one of the recognized edible oil and has substantial medicinal properties due to the presence of unique natural edible substances. Inflammation is an adaptive response that is triggered by noxious stimuli and conditions, which involves interactions amongst many cell types and mediators, and underlies many pathological processes. Unsaturated fatty acids (UFAs) can influence inflammation through a variety of mechanisms, and have been indicated as alternative anti-inflammatory agents to treat several inflammatory skin disorders. Pumpkin seed oil is rich in (UFAs), that its t
... Show MoreDecision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This
... Show MoreIn this study, we investigate the run length properties for the EWMA charts with time - varying control limits, and fast initial Response (FIR), for monitoring the mean of a normal process with a known standard deviation , by using non - homogeneous markov chain approach.
The increased use of hybrid PET /CT scanners combining detailed anatomical information along withfunctional data has benefits for both diagnostic and therapeutic purposes. This presented study is to makecomparison of cross sections to produce 18F , 82Sr and68Ge via different reactions with particle incident energy up to 60 MeV as a part of systematic studies on particle-induced activations on enriched natNe, natRb, natGa 18O,85Rb, and 69Ga targets, theoretical calculation of production yield, calculation of requiredtarget and suggestion of optimum reaction to produce: Fluorine-18 , Strontium-82 andGermanium-68 touse in Hybrid Machines PET/CT Scanners.
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
In this work, a magnetic switch was prepared using two typesof ferrofluid materials, the pure ferrofluid and ferrofluid doped with copper nanoparticles (10 nm). The critical magnetic field (Hc) and the state of magnetic saturation (Hs) were studied using three types of laser sources. The main parameters of the magnetic switch measured using pure ferrofluid and He-Ne Laser source were Hc(0.5 mv, 0.4 G), Hs (8.5 mv, 3 G). For the ferrofluid doped with copper nanoparticles were Hc (1 mv, 4 G), Hs (15 mv, 9.6 G), Using green semiconductor laser for the Pure ferrofluid were Hc (0.5 mv, 0.3 G) Hs (15 mv, 2.9 G). While the ferrofluid doped with copper nanoparticles were Hc (0.5 mv, 1 G), Hs (12 mv, 2.8 G) and by using the violet semiconductor l
... Show MoreThe permeability determination in the reservoirs that are anisotropic and heterogeneous is a complicated problem due to the limited number of wells that contain core samples and well test data. This paper presents hydraulic flow units and flow zone indicator for predicting permeability of rock mass from core for Nahr-Umr reservoir/ Subba field. The Permeability measurement is better found in the laboratory work on the cored rock that taken from the formation. Nahr-Umr Formation is the main lower cretaceous sandstone reservoir in southern of Iraq. This formation is made up mainly of sandstone. Nahr-Umr formation was deposited on a gradually rising basin floor. The digenesis of Nahr-Umr sediments is very important du
... Show MoreFacial identification is one of the biometrical approaches implemented for identifying any facial image with the use of the basic properties of that face. In this paper we proposes a new improved approach for face detection based on coding eyes by using Open CV's Viola-Jones algorithm which removes the falsely detected faces depending on coding eyes. The Haar training module in Open CV is an implementation of the Viola-Jones framework, the training algorithm takes as input a training group of positive and negative images, and generates strong features in the format of an XML file which is capable of subsequently being utilized for detecting the wanted face and eyes in images, the integral image is used to speed up Haar-like features calc
... Show MoreFinger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network
... Show MoreWireless control networks (WCNs), based on distributed control systems of wireless sensor and actuator networks, integrate four technologies: control, computer network and wireless communications. Electrostatic precipitator (ESP) in cement plants reduces the emissions from rotary kiln by 99.8% approximately. It is an important thing to change the existing systems (wireline) to wireless because of dusty and hazardous environments. In this paper, we designed a wireless control system for ESP using Truetime 2 beta 6 simulator, depending on the mathematical model that have been built using identification toolbox of Matlab v7.1.1. We also study the effect ofusing wireless network on performance and stability of the closed l
... Show More