Recently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE data trafc. The proposal relies on selected header bits from the trafc class eld of a packet using the ML to prioritize trafc ows according to the precedence levels by governing the Differentiated Services Code Point (DSCP) bits in keeping with network administrator policies. The proposed network has been evaluated and performed utilizing theMATLAB platform and the Mininet simulator. The results of extensive testing show enhancement by applying our forcing priority algorithm obtained an efcient reduction in queuing delay and lost packets. The average waiting time in queue was reduced by around 61%, and the lost packets hit 0.005% when adopting the SDN-based ML network trafc priority management.
The researcher attempts to diagnose the level of the effect of strategic thinking skills (intuition, meditation, creativity) of the managers in the Ministry of Health in Iraq and some of its institutions in the formulation of human resources management: (selection, training, incentivence , performance appraisal (Recognizing the importance of the subjects studied, and because of the importance of the expected results of th
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreIn this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreBackground: Smoking is considering a major risk factor for development and progression of periodontal disease. Investigations regarding the association between smoking and periodontal disease have consistently demonstrated negative periodontal effects and greater probabilities of established periodontal disease among smokers in comparison with non smokers. The purpose of this study was to evaluate the effects of smoking on periodontal health status and on the salivary levels of alkaline phosphatase (ALP), lactate dehydrogenase (LDH) and creatine kinase (CK), and to correlate the clinical parameters of periodontal health with the biochemical findings in smokers and non-smokers. Materials and methods: Unstimulated saliva sample was collected
... Show MoreOur aim was to investigate the inclusion of sexual and reproductive health and rights (SRHR) topics in medical curricula and the perceived need for, feasibility of, and barriers to teaching SRHR. We distributed a survey with questions on SRHR content, and factors regulating SRHR content, to medical universities worldwide using chain referral. Associations between high SRHR content and independent variables were analyzed using unconditional linear regression or χ2 test. Text data were analyzed by thematic analysis. We collected data from 219 respondents, 143 universities and 54 countries. Clinical SRHR topics such as safe pregnancy and childbirth (95.7%) and contraceptive methods
The use of real-time machine learning to optimize passport control procedures at airports can greatly improve both the efficiency and security of the processes. To automate and optimize these procedures, AI algorithms such as character recognition, facial recognition, predictive algorithms and automatic data processing can be implemented. The proposed method is to use the R-CNN object detection model to detect passport objects in real-time images collected by passport control cameras. This paper describes the step-by-step process of the proposed approach, which includes pre-processing, training and testing the R-CNN model, integrating it into the passport control system, and evaluating its accuracy and speed for efficient passenger flow
... Show More