Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject area is the optimal self-organized service placement. In this paper a heuristic-based algorithm for service placement in future networks was presented. This algorithm achieves the ideal placement of services replicas by monitoring the load within the server and its neighborhood, choosing the node that contributes with the highest received load, and finally replicating or migrating the service to it based on specific criteria, so that the distance of requests coming from clients becomes as small as possible because of placing services within nearby locations. It was proved that our proposed algorithm achieves an improved performance by meeting the services within a shorter time, a smaller bandwidth, and thus a lower communication cost. It was compared with the traditional client-server approach and the random placement algorithm. Experimental results showed that the heuristic algorithm outperforms other approaches and meets the optimal performance with different network sizes and varying load scenarios.
In this work, silver (Ag) self-metallization on a polyimide (PI) film was prepared through autocatalytic plating. PI films were prepared through the solution casting method, followed by etching with potassium hydroxide (KOH) solution, sensitization with tin chloride (SnCl2), and the use of palladium chloride (PdCl2) to activate the surface of PI. Energy-dispersive X-ray analysis (EDX) showed the highest peak in the (Ag) region and confirmed the presence of AgNPs. The diffraction peaks at 2θ = 38.2°, 44.5°, 64.6°, and 78.2° represented the 111, 200, 220, and 311 planes of Ag, respectively. The FT–IR an
... Show Moreالخلاصة
تتناول هذه الورقة مخططات وسياسات الاستيطان في الضفة الغربية والقدس الشرقية منذ العام 1967، عبر سياسات قادها حزب العمل وأكملها حزب الليكود وكاديما وبقية الأحزاب الإسرائيلية، تلك السياسات التي استهدفت فرض السيطرة السياسية الكاملة على الأرض، وما نتج عن ذلك من سيطرة حصرية على الأرضوتقييد استخداماتها، ومحاصرة الوجود الفلسطيني والتضييق عليه، وتحويل مراكز ال
... Show MoreAbstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, t
... Show MoreIn recent years, the field of research around the congestion problem of 4G and 5G networks has grown, especially those based on artificial intelligence (AI). Although 4G with LTE is seen as a mature technology, there is a continuous improvement in the infrastructure that led to the emergence of 5G networks. As a result of the large services provided in industries, Internet of Things (IoT) applications and smart cities, which have a large amount of exchanged data, a large number of connected devices per area, and high data rates, have brought their own problems and challenges, especially the problem of congestion. In this context, artificial intelligence (AI) models can be considered as one of the main techniques that can be used to solve ne
... Show MoreThe current research aims to identify the self-regulation of university students, as well as to identify the significance of the difference in self-regulation according to the variable of sex (male-female), specialization (scientific-human), and grade (first-fourth). To achieve the research objectives, the two researchers developed a scale of (28) items about self-regulation According to the theory of (Pandora, 1991). The scale was administered to (500) students from the first and fourth stages of Al -Mustansiriyah University who were selected based on the random stratification method for the 2020/2021 academic year. The results showed that university students have a good level of self-regulation. There are no significant differences in
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreOptimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co
... Show MoreSurface water flow samples were collected with distances downstream over Saqlawiya main drain whose stretch of about 24.5 km. The drain travels through different land use pattern, before, flowing into Tigris River. Eight sampling points were carefully
selected downstream the channel during dry season. The examined water parameters were pH, NH3, NO3, PO= 4, BOD5, COD, TDS, S.S, Cl-, SO= 4, Na+ , Ca+2, Mg+2, and Oil and Grease. Descriptive and inferential methods through finding the best curve fit correlation were employed in the study to test the strength of the association between water chemical characteristics and distance downstream the channel. A comparison of the values of chemical parameters at the Al-Saqlawiya Drain-Tigris Riv