Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable results comparing with others. Computer simulation has been performed to study and verify the above mechanisms in the performance enhancement using the OPNET simulator.
The article aims to study the crisis of political change from three Phases . The first focuses on the crises of political legitimacy and democratic postponement, as fundamental issues in analyzing the phenomenon of power struggle through the dialectic between the concept of historical legitimacy and institutional fragility from the beginning of statehood in 1962 to the stage of multi-partyism and the cessation of the electoral process in the 1990s. While the second focuses on the question of the monopoly of power in the post-terrorism and national reconciliation according to considerations Political, social and security measures to prolong the life of the regime and avoid the demands of political change brought about
... Show MoreAbstract Political power in Lebanon is a fundamental objective of any political organization, whether political party or political group. Thus, there is a conflict of power. There are two kinds of political conflict that are differentiated by the idea of legitimacy. The competition is in the political system when the agreement between the social forces is considered legitimate, and the conflict is on the political system when the agreement between these forces ceases to be legitimate and Are working to topple it and seek to establish an alternative system. Therefore, the succession of power in Lebanon is a result of the competition and political conflict, which is in turn a result of the large number of regional and international players
... Show MoreThe field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show MoreThe research aims to identify how to enhance the quality of the human resources, focusing on four dimensions (efficiency, effectiveness, flexibility, and reliability), by adopting an adventure learning method that combines theoretical and applied aspects at the same time, when developing human resources and is applied using information technology, and that Through its dimensions, which are (cooperation, interaction, communication, and understanding), as the research problem indicated a clear deficiency in the cognitive perception of the mechanism of employing adventure learning dimensions in enhancing human resources quality, so the importance of research was to present treatments and proposals to reduce this problem. To achieve
... Show MoreIn this work ,the modified williamos-Hall method was used to analysis the x-ray diffraction lines for powder of magnesium oxide nanoparticles (Mgo) .and for diffraction lines (111),(200),(220),(311) and (222).where by used special programs such as origin pro Lab and Get Data Graph ,to calculate the Full width at half maximum (FWHM) and integral breadth (B) to calculate the area under the curve for each of the lines of diffraction .After that , by using modified Williamson –Hall equations to determin the values of crystallite size (D),lattice strain (ε),stress( σ ) and energy (U) , where was the results are , D=17.639 nm ,ε =0.002205 , σ=0.517 and U=0.000678 respectively. And then using the scherrer method can by calculated the crystal
... Show MoreThe category of those who agree with the phrase: The Environment and Life Program warns me of the environmental damages resulting from the issue of using black oil in electrical generators in residential neighborhoods came first, with a high rate of 81.4%. With the environment, the public always turns to the public broadcasting service and its programs to provide knowledge so that it can avoid it. Thus, the respondents' attitude towards this issue was positive.
Examining and comparing the image quality of degenerative cervical spine diseases through the application of three MRI sequences; the Two-Dimension T2 Weighed Turbo Spin Echo (2D T2W TSE), the Three-Dimension T2 Weighted Turbo Spin Echo (3D T2W TSE), and the T2 Turbo Field Echo (T2_TFE). Thirty-three patients who were diagnosed as having degenerative cervical spine diseases were involved in this study. Their age range was 40-60 years old. The images were produced via a 1.5 Tesla MRI device using (2D T2W TSE, 3D T2W TSE, and T2_TFE) sequences in the sagittal plane. The image quality was examined by objective and subjective assessments. The MRI image characteristics of the cervical spines (C4-C5, C5-C6, C6-C7) showed significant difference
... Show MoreStatistics has an important role in studying the characteristics of diverse societies. By using statistical methods, the researcher can make appropriate decisions to reject or accept statistical hypotheses. In this paper, the statistical analysis of the data of variables related to patients infected with the Coronavirus was conducted through the method of multivariate analysis of variance (MANOVA) and the statement of the effect of these variables.
The important device in the Wireless Sensor Network (WSN) is the Sink Node (SN). That is used to store, collect and analyze data from every sensor node in the network. Thus the main role of SN in WSN makes it a big target for traffic analysis attack. Therefore, securing the SN position is a substantial issue. This study presents Security for Mobile Sink Node location using Dynamic Routing Protocol called (SMSNDRP), in order to increase complexity for adversary trying to discover mobile SN location. In addition to that, it minimizes network energy consumption. The proposed protocol which is applied on WSN framework consists of 50 nodes with static and mobile SN. The results havw shown in each round a dynamic change in the route to reach mobi
... Show More