Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational characteristics of traffic flow types; by considering only the position of the selected bits from the packet header. The proposal a learning approach based on deep packet inspection which integrates both feature extraction and classification phases into one system. The results show that the FDPHI works very well on the applications of feature learning. Also, it presents powerful adequate traffic classification results in terms of energy consumption (70% less power CPU utilization around 48% less), and processing time (310% for IPv4 and 595% for IPv6).
OBJECTIVE: To assess and compare the knowledge, attitudes and practice regarding obesity management among family and non family physicians working in primary health care centers.
Delays and disruption are a common issue in both community and personal building programs The problem exists all throughout the world, but it is particularly prevalent in Iraq, where millions of dollars are squandered each time as a outcome. Delays and interruptions may have serious consequences not just for Iraq's construction plans, but also for the country's economic and social status. While numerous studies have been conducted to investigate the factors driving delays and disruption in Iraqi construction projects, slight consideration has been given to by what means project management implements and approaches have affected the occurrence of project delays and disruption. After analyzing the crucial reasons for delays and instability in
... Show MoreThe research problem is that most of the construction projects exceed the planned value, due to the failure to implement the plans on time. The current study aims to monitor the implementation of the project and for each of the executed tasks of the table of quantities in order to detect deviations at the time they occur, evaluate the time and cost performance, and then identify the areas of waste and analyze the implementation of each task in order to diagnose the underlying problems and find possible and applicable solutions in the environment Iraqi. The research was applied in one of the companies specialized in the field of construction projects, and one of the most important conclusions reached is the possibility of applying
... Show MoreRealizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MorePurpose: to demonstrate the possibility of moving to electronic data exchange dimensions (regulatory requirements, technical requirements, human requirements, senior management support) to simplify the work procedures dimensions (modern procedures, clarity of procedures, short procedures, availability of information and means required. The simplicity of the models used because of its importance to keep abreast of recent developments in the service of municipal works through the application of electronic data interchange, which simplifies procedures and out of the routine in the performance of the work of municipal departments has developed. It was applied to Municipality (Hilla) so that the transformation
... Show MoreObjective: study aims to identify the diabetes type2 clients self management skills toward dietary pattern
, and find out the relationship between variables which are (Age, gender, educational level, duration of DM
diagnosis, and monthly income) with diabetes type 2 clients self management skills toward dietary pattern
Methodology: descriptive study was carried out through the present investigation from January 2nd
2011to September 2nd 2011 in order to achieve the objectives of the present study. A non probability
(purposive) sample, (200) cases which consists of clients who were attending Al-Nasiriyha diabetic center.
Including (118) males and (82) females. The data were collected by utilization of the study instrument
Objective(s): To evaluate nurses' knowledge toward pain management of leukemic child in oncology wards
how were receiving chemotherapy.
Methodology: A descriptive study was conducted in two hospitals on (40) nurses, who provided care for the
children with leukemia in oncology wards (2) hospitals (Children Welfare Teaching Hospital and Child’s Central
Teaching Hospital) in Baghdad city from October 2010 up to the 27th of October 2011 for the purpose of
evaluating their knowledge towards pain management for leukemic child. A purposive "non-probability
sample" was selected that consisted of (40) nurse who are working in oncology wards. A questionnaire format
was used which consist of (2) parts, the first part includes
Background: Plants used in folk medicine for
the treatment of peptic ulcer diseases is a very
promising approach to overcome the limitations of
classical medicines.
Aim: To explore the efficacy of medicinal
plants, namely turmeric, garlic and marshmallow,
in eradication of H. pylori.
Methods: This prospective study was carried out
on 225 of well-known dyspeptic patients who were
divided into four groups; a control group (received
classical medical therapy) and three other groups
that received one of the three medicinal plants,
plus the same therapy used in the control group.
The follow up was done by using a questionnaire
form, endoscopic examination, and determination
of serum levels of anti