In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate precedence level for the data traffic flow. The control and modification of the DSCP bits directly impact the priority assigned to data packets, thereby shaping the traffic flow continuity accordingly. The evaluation and performance analysis of the proposed network were conducted using the Mininet simulator and the MATLAB platform. The outcomes of the comprehensive testing demonstrate that the implementation of our novel priority management technique has successfully reduced queuing delay and minimized packet loss. As a result, the overall data traffic continuity has been significantly enhanced. The obtained results demonstrate that the traffic flow continuity, handled by the Software-Defined Networking (SDN) controller with the support of DSCP modification, has increased by approximately 65% when implementing the proposed priority management based on DSCP bits modification in the SDN network.
Serum Creatine Kinase (SCK) activity was investigated in hyper
and hypqtbyroidim objects. Estimated Levels were compared with
healty controls.
Optimizat.im of SCK. activity has. been achieved using 0.95 mJ of
the Semtl.l and 25 m mol/L of -the subslratet creatitie phosphate . Reaction mixture was incubated at 37C for 1 0 minutes . Data obtained were r:cflects an elevation in the enzme activity in hyperthyroidism objec. Determination of the physical parameters (Vma-x and Km). were ol-,tained applying lit1eweaver- l3:urk Plot analysis. All detemi
... Show MorePraise be to God, prayer, and peace be upon the Messenger of Allah and his God and his companions. The field of the judiciary to prove or invalidate some cases in the field of proof of descent and attachment to the plaintiff or exile, and other legal and judicial issues, especially in this era where the spread of previously unknown evidence, such as DNA, which was discovered in 1953, and the genetic fingerprint discovered 1984, blood analysis and a Saliva, sweat, poetry, etc. in the field of forensic evidence, in forensic medicine or medical expertise, it can be used to identify the killer, or verify his identity, using all the evidence in the scene, such as a point of blood or sweat, and the like So, as well as to prove the lineage is u
... Show MoreThe aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
Artificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show MoreBlockchain technologies have grown in popularity over the last few years, with various experts touting the technology's potential applications in a range of businesses, markets, organizations, and governmental institutions. In the brief history of blockchain, an astounding number of incredible implementations have been done in terms of how it may be utilized and the potential effect it may have on a range of sectors. And, because of the great number and complexity of these characteristics, addressing the blockchain's potential and complications can be difficult, especially when seeking to address its purpose and fit for a certain activity. The blockchain's practical skills in fixing multiple challenges that are currently prevent
... Show MoreDBN Rashid, Al- Utroha Journal, 2018
Naber and toning in the modern Arab poetry Mahmoud Darwish, a model
ZG Abdulrazaq, MR Younus, Nasaq, 2023