The majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution variants have been adopted to solve the 5G RNP problem. Experimental results have shown that the constrained DE/best/1/bin has achieved best results over other variants in terms of deployment cost, coverage rate and quality of service (QoS).
Due to the high mobility and dynamic topology of the FANET network, maintaining communication links between UAVs is a challenging task. The topology of these networks is more dynamic than traditional mobile networks, which raises challenges for the routing protocol. The existing routing protocols for these networks partly fail to detect network topology changes. Few methods have recently been proposed to overcome this problem due to the rapid changes of network topology. We try to solve this problem by designing a new dynamic routing method for a group of UAVs using Hybrid SDN technology (SDN and a distributed routing protocol) with a highly dynamic topology. Comparison of the proposed method performance and two other algorithms is simula
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MorePlanning of electrical distribution networks is considered of highest priority at the present time in Iraq, due to the huge increase in electrical demand and expansions imposed on distribution networks as a result of the great and rapid urban development.
Distribution system planning simulates and studies the behavior of electrical distribution networks under different operating conditions. The study provide understanding of the existing system and to prepare a short term development plan or a long term plan used to guide system expansion and future investments needed for improved network performance.
The objective of this research is the planning of Al_Bayaa 11 kV distribution network in Baghdad city bas
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreThe aim of this study is to investigate the nature of the relationship between domestic savings and domestic investment, or rather the efficiency of domestic savings in financing development in Algeria, in order to explain this relationship, identify the challenges to investment, and finance and accelerate economic growth. The economic measurement methodology has estimated the relationship between the savings rate and the local investment rate in the Algerian economy. We have annual data for the period 1970-2014. One of the most important conclusions is that there is no relationship between savings and investment, nor even an integration between them. To illustrate this, the use of some statistical tools, a
... Show MoreThe last ten years observed a shift enormous scientific in the method and way that it deals professional with the cost accounting and reflected the result those shift enormous scientific of increase the competitive environmental that accompanied the emergence of a modern manufacturing environmental on surface the long roductive life and emergence advanced information technology that give a central focus of his important on client with growing global markets growth on a large scale.
The research aim to define the concept of cost awareness, the concept and methods of strategic cost management and the role of cost awareness for managers of industrial units in strategic of cost managem
... Show MoreDocumentary Credit passes through many practical phases starting from Opening credit and matching documents and payment of the amount of credit……etc. It is worthy to mention that there are several aspects that are varied and differed from Bank to another one which can offer Competitive Advantage for the bank …This will be shown in this research.
For the purpose of achieving the objective of this research within the theoretical aspect, the researcher had seen and briefed several books and researches which are mainly related to the subject of the research.
As for the practical aspect, has included Questionnaire which included many questions that are fit and suitable to the hypotheses.
Research sample has
... Show MoreThe construction sector is considered an important and influential pivot in the national economy of any country. Nations are working to develop this sector, receiving modern and developed techniques. So, this sector can be a carrier or a receiver of modern technologies. The cost of technology transfer between the international companies that sponsor this sector is a matter of great importance, especially since different factors affect the need for this advanced technology. The cost of technology transfer in construction is related to multiple factors presented by Knowledge, equipment, plant, hardware and software. The lack of distinguishing and evaluating the direct and indirect costs in the construction sector during
... Show More