The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Background: Chronic obstructive pulmonary disease (COPD) is a progressive airflow limitation that is preventable but not curable. It is associated with persistent symptoms that cause a considerable burden on individual productivity at work, and daily activities, and reduced quality of life, also burdening the healthcare system and society. Objectives: The study aims to measure the burden of COPD on patients in terms of daily activities and work productivity. It also seeks to investigate some inflammatory biomarkers' levels and their correlation with selected outcomes. Patients and Methods: A cross-sectional study on 120 stable COPD patients who were diagnosed and treated according to the GOLD guidelines at Kirkuk General Hospital's
... Show MoreAbstract:
Organizations need today to move towards strategic innovation, which means the analysis of positions, especially the challenges faced by the change in the external environment, which makes it imperative for the organization that you reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures. Now this research dilemma intellectual two-dimensional, yet my account in not Take writings and researchers effect strategic innovation in re-engineering business processes, according to science and to inform the researcher, and after the application represented in the non-application of such resear
... Show MoreKey generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show MoreBackground: Recurrent aphthous stomatitis (RAS) is one of the most common oral mucosal disorders with a prevalence of 50-66%. The prevalence of hematinic deficiencies including ferritin and vitamin B12 deficiencies and their role in the prophylaxis and development of RAS is not well known. Many studies have demonstrated a high prevalence of hematinic deficiencies in patients with RAS. This study aimed to compare the serum level of ferritin and vitamin B12 in patients with recurrent aphthous ulcers and healthy controls. Subjects, Materials and Methods: The data were collected from patients who needed blood analysis to exclude anemia from November 2020 to May 2021. The study was approved by the institutional ethics committee. After recordi
... Show MoreThis study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security is
... Show MoreDairy wastewater generally contains fats, lactose, whey proteins, and nutrients. Casein precipitation causes the effluent to decompose into a dark, strong-smelling sludge. Fluid waste contains soluble organic matter, suspended solids, and gaseous organic matter, which cause undesirable taste and smell, grant tone and turbidity, and advance eutrophication, which plays an essential role in increasing biological oxygen demand (BOD) in water. It also contains detergents and disinfecting agents from the rinses and washing processes, which increase the need for chemical oxygen (COD). One of the characteristics of dairy effluents is their relatively high temperature, high organic contents, and wide pH range, so the discharge of wastewater into
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show More