In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate precedence level for the data traffic flow. The control and modification of the DSCP bits directly impact the priority assigned to data packets, thereby shaping the traffic flow continuity accordingly. The evaluation and performance analysis of the proposed network were conducted using the Mininet simulator and the MATLAB platform. The outcomes of the comprehensive testing demonstrate that the implementation of our novel priority management technique has successfully reduced queuing delay and minimized packet loss. As a result, the overall data traffic continuity has been significantly enhanced. The obtained results demonstrate that the traffic flow continuity, handled by the Software-Defined Networking (SDN) controller with the support of DSCP modification, has increased by approximately 65% when implementing the proposed priority management based on DSCP bits modification in the SDN network.
The research aims to know the extent of the impact of the risks of foreign exchange centers represented in commitment risks, liquidity risks, and exchange rate risks on the continuity of the economic unit. The research in the light of its presentation of the intellectual, cognitive and applied contributions about the risks of foreign currency centers and the continuity of the economic unit, and represented the research community in the banking sector, and the sample included nine private commercial banks listed in the Iraq Stock Exchange, and they relied on the research on a time series consisting of four years that extended from one year 2017 to 2020. The research problem was the impact of the risks associated with foreign currency cent
... Show MoreKinetic and mechanism studies of the oxidation of oxalic acid by Cerium sulphate have been carried out in acid medium sulphuric acid. The uv- vis. Spectrophotometric technique was used to follow up the reaction and the selected wavelength to be followed was 320 nm. The kinetic study showed that the order of reaction is first order in Ce(IV) and fractional in oxalic acid. The effect of using different concentration of sulphuric acid on the rate of the reaction has been studied a and it was found that the rate decreased with increasing the acid concentration. Classical organic tests was used to identify the product of the oxidation reaction, the product was just bubbles of CO2.
The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
The paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main
... Show MoreA reliable and environmental analytical method was developed for the direct determination of tetracycline using flow injection analysis (FIA) and batch procedures with spectrophotometric detection. The developed method is based on the reaction between a chromogenic reagent (vanadium (III) solution) and tetracycline at room temperature and in a neutral medium, resulting in the formation of an intense brown product that shows maximum absorption at 395 nm. The analytical conditions were improved by the application of experimental design. The proposed method was successfully used to analyze samples of commercial medications and verified throughout the concentration ranges of 25–250 and 3–25 µg/mL for both FIA and batch procedures, respecti
... Show MorePositive and negative parity states for 114Te have been studied applying the vibration al limit U(5) of Interacting boson model (IBM- 1 ) . The present results have shown their good agreement with experimental data in addition to the determination of the spin/parity of new energy levels are not assigned experimentally as the levels 0+2 and 5+1 and the levels 3"1 and 5-1 . Then back propagation multiLayer neural network used for positive and negative parity states for 114Te and shown their membership to the Vibration limit U(5) the network implemented by MATLAB system.
This study aims at describing the identity crisis of Diaspora people (Arab -American) in "Laila Halaby's" novel "Once in A promise Land". Halaby tackles the issues of racism, exclusion, and instability of identity that affect the Arab American community after the terrorist event of eleventh of September. She sheds light on the experiences of her significant characters Salwa and Jassim in America, clarifying how this event weakened their social position and turns their presence in America questionable. "Halaby" describes the bitterness of her characters who are induced into a dream of belonging to a land that transcends their original culture and religious values as well as their language. "Halaby" explains the subsistence in America involvi
... Show MoreThe software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem. The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link).
... Show More