<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.</p>
The employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a
... Show MoreThis research a mining at evaluation the efficiency of the nursing performance depended on standards of W.H.O. via application standards of W.H.O on the nursing personnel in medical city office, in light of it, it has design world evaluation list, and a sample was chosen from the nursing personnel in given researched the organization whom they are evaluated according to the standards of W.H.O for the nursing performance included of ten standards, divided in to 45 question , besides the evaluation list, the researcher get assistance of some tools of collection information via actual checking and personal interviews, a number of statistical means were used to manipulate t
... Show MoreObjective(s): This study aims to evaluate the hardness of two commercially available cold cured acrylic resin material
(Vertex and PAN) when polymerized at different temperature in comparison to those polymerized by conventional
methods in air at 23C ± 5C.
Methodology: Eighty specimens, forty from cold cured acrylic (Vertex Type) and forty from cold cured acrylic (PAN
type) were prepared, flasking and packing procedure were done according to manufacturer direction and divided
according to processing as follow: 20 specimens (10 from Vertex type and 10 from PAN type) were processed in air for
two hours at 23C ± 5C under press (bench curing) as a control, and 60 specimens (30 from Vertex type and 30 from
PAN type) wer
The aim of the present study is to formulate, evaluate and characterize the nanoemulsion of Domperidone a poorly water-soluble anti-emetic drug.
Domperidone powder is white or almost white powder, photosensitive, practically insoluble in water, slightly soluble in ethanol and in methanol; soluble in dimethylformamide. It is used as an antiemetic for the short-term treatment of nausea and vomiting of various etiologies.
Solubility studies were conducted to select the oil, surfactant and cosurfactant. Phase diagrams were constructed by aqueous phase
... Show MoreSurvival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re
... Show MoreOlanzapine (OLZ) is classified as a typical antipsychotic drug utilized for the treatment of schizophrenia. Its oral bioavailability is 60% due to its low solubility and pre-systemic metabolism. Hence, the present work aims to formulate and evaluate OLZ nanoparticles dissolving microneedles (MNs) for transdermal delivery to overcome the problems associated with drug administration orally. OLZ nanoparticles were prepared by the nanoprecipitation method. The optimized OLZ nanoparticle formula was utilized for the fabrication of dissolving MNs by loading OLZ nanodispersion into polydimethylsiloxane (PDMS) micromould cavities, followed by casting the polymeric solution of polyvinylpyrrolidone(PVP-K30) and polyvinyl alcohol (PVA) to form
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis work represents study the rock facies and flow unit classification for the Mishrif carbonate reservoir in Buzurgan oil Field, which located n the south eastern Iraq, using wire line logs, core samples and petrophysical data (log porosity and core permeability). Hydraulic flow units were identified using flow zone indicator approach and assessed within each rock type to reach better understanding of the controlling role of pore types and geometry in reservoir quality variations. Additionally, distribution of sedimentary facies and Rock Fabric Number along with porosity and permeability was analyzed in three wells (BU-1, BU-2, and BU-3). The interactive Petrophysics - IP software is used to assess the rock fabric number, flow zon
... Show More