Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable results comparing with others. Computer simulation has been performed to study and verify the above mechanisms in the performance enhancement using the OPNET simulator.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
Volumetric Modulated Arc Therapy (VMAT) and Intensity Modulated Radiation Therapy (IMRT) are comparable for nasopharyngeal cancerous radiation therapy. This research intends to analyze the high-quality plan using accomplishment, conformance, and homogeneity criteria.
The study involved 40 patients with a postnasal cancerous tumor. The patients underwent computed tomography (CT) simulation to scan the anatomical details of the patients' heads. Then, their data was forwarded to the treatment planning system (TPS) workstation for IMRT and VMAT planning. The plans were evaluated using the IOA, HI, and CI indices.
The nasopharynx coverage results consist of the GTV and PTV at 95%. The statistical study reveals that VMAT provides
... Show MoreThe main aim of this paper is to apply a new technique suggested by Temimi and Ansari namely (TAM) for solving higher order Integro-Differential Equations. These equations are commonly hard to handle analytically so it is request numerical methods to get an efficient approximate solution. Series solutions of the problem under consideration are presented by means of the Iterative Method (IM). The numerical results show that the method is effective, accurate and easy to implement rapidly convergent series to the exact solution with minimum amount of computation. The MATLAB is used as a software for the calculations.
This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
A water resources management for earthen canal/stream is introduced through creating a combination procedure between a field study and the scientific analytical concepts that distinguish the hydraulic problems on this type of stream with using the facilities that are available in HECRAS software; aiming to point the solutions of these problems. Al Mahawil stream is an earthen canal which is subjected to periodic changes in cross sections due to scour, deposition, and incorrect periodic dredging processes due to growth of the Ceratophyllum plants and weeds on the bed and banks of the stream; which affect the characteristics of the flow. This research aims to present a strategy of water resources management through a field study that conducte
... Show MoreIn the present study, an attempt has been to develop a new water quality index (WQI) method that depends on the Iraqi specifications for drinking water (IQS 417, 2009) to assess the validity of the Euphrates River for drinking by classifying the quality of the river water at different stations along its entire reach inside the Iraqi lands. The proposed classifications by this method are: Excellent, Good, Acceptable, Poor, and Very poor. Eight water quality parameters have been selected to represent the quality of the river water these are: Ion Hydrogen Concentration (pH), Calcium (Ca), Magnesium (Mg), Sodium (Na), Chloride (Cl), Sulphate (SO_4), Nitrate (NO_3), and Total Dissolved Solids (TDS). The variation of the water quality p
... Show MoreBubbled slabs can be exposed to damage or deterioration during its life. Therefore, the solution for strengthening must be provided. For the simulation of this case, the analysis of finite elements was carried out using ABAQUS 2017 software on six simply supported specimens, during which five are voided with 88 bubbles, and the other is solid. The slab specimens with symmetric boundary conditions were of dimensions 3200/570/150 mm. The solid slab and one bubbled slab are deemed references. Each of the other slabs was exposed to; (1) service charge, then unloaded (2) external prestressing and (3) loading to collapse under two line load. The external strengthening was applied using prestressed wire with four approaches, wh
... Show MoreTwelve species from Brassicaceae family were studied using two different molecular techniques: RAPD and ISSR; both of these techniques were used to detect some molecular markers associated with the genotype identification. RAPD results, from using five random primers, revealed 241 amplified fragments, 62 of them were polymorphic (26%).
ISSR results showed that out of seven primers, three (ISSR3, UBC807, UBC811) could not amplify the genomic DNA; other primers revealed 183 amplified fragments, 36 of them were polymorphic (20%). The similarity evidence and dendrogram for the genetic distances of the incorporation between the two techniques showed that the highest similarity was 0.897 between the va
... Show More