In recent days, the escalating need to seamlessly transfer data traffic without discontinuities across the Internet network has exerted immense pressure on the capacity of these networks. Consequently, this surge in demand has resulted in the disruption of traffic flow continuity. Despite the emergence of intelligent networking technologies such as software-defined networking, network cloudification, and network function virtualization, they still need to improve their performance. Our proposal provides a novel solution to tackle traffic flow continuity by controlling the selected packet header bits (Differentiated Services Code Point (DSCP)) that govern the traffic flow priority. By setting the DSCP bits, we can determine the appropriate precedence level for the data traffic flow. The control and modification of the DSCP bits directly impact the priority assigned to data packets, thereby shaping the traffic flow continuity accordingly. The evaluation and performance analysis of the proposed network were conducted using the Mininet simulator and the MATLAB platform. The outcomes of the comprehensive testing demonstrate that the implementation of our novel priority management technique has successfully reduced queuing delay and minimized packet loss. As a result, the overall data traffic continuity has been significantly enhanced. The obtained results demonstrate that the traffic flow continuity, handled by the Software-Defined Networking (SDN) controller with the support of DSCP modification, has increased by approximately 65% when implementing the proposed priority management based on DSCP bits modification in the SDN network.
We consider the outflow of water from the peak of a triangular ridge into a channel of finite depth. Solutions are computed for different flow rates and bottom angles. A numerical method is used to compute the flow from the source for small values of flow rate and it is found that there is a maximum flow rate beyond which steady solutions do not seem to exist. Limiting flows are computed for each geometrical configuration. One application of this work is as a model of saline water being returned to the ocean after desalination. References Craya, A. ''Theoretical research on the flow of nonhomogeneous fluids''. La Houille Blanche, (1):22–55, 1949. doi:10.1051/lhb/1949017 Dun, C. R. and Hocking, G. C. ''Withdrawal of fluid through
... Show MoreThe art of theater penetrated various scientific and human fields, as well as touching the facts and events surrounding it, and scientific innovations had a wide field, so it adopted feedback in interactive theater performances, especially the theater of the oppressed. Then came the indicators that resulted from the theoretical framework for the formation of the tool by which the research sample is analyzed, and then the chapter concluded with previous studies. As for the third chapter, it involved the research procedures, and through the research tool and the research method, and by selecting the intentional sample, the sample represented by a play (the story of Shahrour) was analyzed. As for the fourth chapter, it included the results
... Show MoreElectrical distribution system loads are permanently not fixed and alter in value and nature with time. Therefore, accurate consumer load data and models are required for performing system planning, system operation, and analysis studies. Moreover, realistic consumer load data are vital for load management, services, and billing purposes. In this work, a realistic aggregate electric load model is developed and proposed for a sample operative substation in Baghdad distribution network. The model involves aggregation of hundreds of thousands of individual components devices such as motors, appliances, and lighting fixtures. Sana’a substation in Al-kadhimiya area supplies mainly residential grade loads. Measurement-based
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreBiomedical alloy 316L stainless steel enhancing to replace biological tissue or to help stabilize a biological structure, such as bone tissue, enhancing were coated with deposition a thin layer of silver nanoparticles as anti-bacterial materials by using DC- magnetron sputtering device. The morphology surface of The growth nanostructure under the influence of different working pressure were studied by atomic force microscope. The average grain size decrease but roughness of the silver thin layer was increased with‖ ―increasing the working pressure. The thickness of silver thin layer was increased from 107 nm at 0.08 mbar to 126 nm at 1.1 mbar. Antimicrobial activity of silver thin layers at different working pressure were studied. Th
... Show More
The mechanism of managing religious difference
God is the Lord of the worlds, forget them and their jinn, Arabs and non-Muslims, He is the Lord of Muslims and Lord of non-Muslims, as He created them male and female despite their differences in tongues and colors, so He created them according to their diversity and distinction in beliefs and religions.
To prevent flare-ups due to differences, the Lord of the worlds set limits that he has forbidden to cross, and draw clear maps as mechanisms for managing religious differences and lifting psychological barriers between the different, so that they can coexist in peace and freedom, each adhering to his faith, and practicing the rituals of his religion.
... Show More