This paper proposed a new method for network self-fault management (NSFM) based on two technologies: intelligent agent to automate fault management tasks, and Windows Management Instrumentations (WMI) to identify the fault faster when resources are independent (different type of devices). The proposed network self-fault management reduced the load of network traffic by reducing the request and response between the server and client, which achieves less downtime for each node in state of fault occurring in the client. The performance of the proposed system is measured by three measures: efficiency, availability, and reliability. A high efficiency average is obtained depending on the faults occurred in the system which reaches to
... Show MoreA total of 48 experiments were conducted to investigate the impact of slit weir dimensions and locations on the maximum scour depth and scour area created upstream. The slit weir model was a 110 mm slit opening, and it was installed at the end of the working section in a laboratory flume. The flume was 10.0 m long, 30 cm wide, 30 cm deep, and almost middle. It includes a 2 m working section with a mobile bed with 110 mm in thickness. In the mobile bed, two types of nonuniform sand (with a geometric standard deviation of 1.58 and 1.6) were tested separately. The weir dimensions and location were changed with flow rates. Then dimensions of the slit weir were changed from 60 x 110 mm to 60 x 70 mm (width x height), while th
... Show MoreIn the light of the globalization Which surrounds the business environment and whose impact has been reflected on industrial economic units the whole world has become a single market that affects its variables on all units and is affected by the economic contribution of each economic unit as much as its share. The problem of this research is that the use of Pareto analysis enables industrial economic units to diagnose the risks surrounding them , so the main objective of the research was to classify risks into both internal and external types and identify any risks that require more attention.
The research was based on the hypothesis that Pareto analysis used, risks can be identified and addressed before they occur.
... Show MoreThe study examines the root causes of delays that the project manager is unable to resolve or how the decision-maker can identify the best opportunities to get over these obstacles by considering the project constraints defined as the project triangle (cost, time, and quality) in post-disaster reconstruction projects to review the real challenges to overcome these obstacles. The methodology relied on the exploratory description and qualitative data examined. 43 valid questionnaires were distributed to qualified experienced engineers. A list of 49 factors causes was collected from previous international and local studies. A Relative Important Index (RII) is adapted to determine the level of importance of each sub-criterion in the fou
... Show MoreObjectives: In developing countries like Iraq, diarrhea was responsible for 70% of deaths among pediatrics. This study was designed to determine Iraqi mothers’ knowledge and malpractices associated with diarrhea management in pediatrics.Methods: A cross-sectional pilot study was done on a convenient sample of mothers in Baghdad – Iraq. Data collection was done using a validated questionnaire specifically designed for this study.Result: Most participants preferred to consult physicians or pharmacists about pediatrics diarrhea management. Breastfeeding was stopped by 19% of participants, whereas 35% of mothers who depend on formulated milk discontinued it. Only 30% of participants use oral rehydration solution therapy always as a
... Show MoreAbstract
This research aims to determine the nature of tacit knowledge relationship and its impact on building the electronic human resources management, as it constitutes the most prominent tacit knowledge resources owned by the Organization for being a stand out in the skill, knowledge and intellectual capacity of human resources, as the electronic human resources management is a contemporary trend that adopted by the organization in the performance of all tasks and duties related workers have remained in the contemporary environment in which it operates.
and have indicated the research problem to the low level of awareness of the ad
... Show MoreObjectives: In developing countries like Iraq, diarrhea was responsible for 70% of deaths among pediatrics. This study was designed to determine Iraqi mothers’ knowledge and malpractices associated with diarrhea management in pediatrics.Methods: A cross-sectional pilot study was done on a convenient sample of mothers in Baghdad – Iraq. Data collection was done using a validated questionnaire specifically designed for this study.Result: Most participants preferred to consult physicians or pharmacists about pediatrics diarrhea management. Breastfeeding was stopped by 19% of participants, whereas 35% of mothers who depend on formulated milk discontinued it. Only 30% of participants use oral rehydration solution therapy always as a
... Show MoreSensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforwar
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More<span lang="EN-GB">Transmitting the highest capacity throughput over the longest possible distance without any regeneration stage is an important goal of any long-haul optical network system. Accordingly, Polarization-Multiplexed Quadrature Phase-Shift-Keying (PM-QPSK) was introduced lately to achieve high bit-rate with relatively high spectral efficiency. Unfortunately, the required broad bandwidth of PM-QPSK increases the linear and nonlinear impairments in the physical layer of the optical fiber network. Increased attention has been spent to compensate for these impairments in the last years. In this paper, Single Mode Fiber (SMF), single channel, PM-QPSK transceiver was simulated, with a mix of optical and electrical (Digi
... Show More