Preferred Language
Articles
/
bsj-6338
Distributed Heuristic Algorithm for Migration and Replication of Self-organized Services in Future Networks
...Show More Authors

Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject area is the optimal self-organized service placement. In this paper a heuristic-based algorithm for service placement in future networks was presented. This algorithm achieves the ideal placement of services replicas by monitoring the load within the server and its neighborhood, choosing the node that contributes with the highest received load, and finally replicating or migrating the service to it based on specific criteria, so that the distance of requests coming from clients becomes as small as possible because of placing services within nearby locations. It was proved that our proposed algorithm achieves an improved performance by meeting the services within a shorter time, a smaller bandwidth, and thus a lower communication cost. It was compared with the traditional client-server approach and the random placement algorithm. Experimental results showed that the heuristic algorithm outperforms other approaches and meets the optimal performance with different network sizes and varying load scenarios.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
دراسات دولية
توظيف خيارات استراتيجيات مكافحة التطرف العنيف في العراق وافاقها المستقبلية
...Show More Authors

أن للتطرف العنيف أسباب متنوعة تقف وراء ظهوره وتمدده في دول العالم المختلفة على نطاق واسع، إذ إن لكل بيئة ظروفها وخصوصياتها الكلية والفرعية التي تسهم في تعزيز القدرة التأثيرية للسلوكيات العنفية في إطار مجتمع ما، لاسيما إذا علمنا إن التطرف العنيف المؤدي الى الإرهاب كسلوكيات عنفية متطرفة مدمرة للبناء المجتمعي ما كان ليستمر لولا وجود بيئة حاضنة وظروف تساعد في انتشاره واستمرارية قدراته التأثيرية في البناء السي

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2024
Journal Name
مجلة دراسات دولية
توظيف خيارات استراتيجيات مكافحة التطرف العنيف في العراق وافاقها المستقبلية
...Show More Authors

أن للتطرف العنيف أسباب متنوعة تقف وراء ظهوره وتمدده في دول العالم المختلفة على نطاق واسع، إذ إن لكل بيئة ظروفها وخصوصياتها الكلية والفرعية التي تسهم في تعزيز القدرة التأثيرية للسلوكيات العنفية في إطار مجتمع ما، لاسيما إذا علمنا إن التطرف العنيف المؤدي الى الإرهاب كسلوكيات عنفية متطرفة مدمرة للبناء المجتمعي ما كان ليستمر لولا وجود بيئة حاضنة وظروف تساعد في انتشاره واستمرارية قدراته التأثيرية في البناء السي

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2009
Journal Name
مجلة قضايا سياسية
العلاقات العراقية - الايرانية بين الثوابت الموضوعية والمتغيرات المستقبلية
...Show More Authors

يناقش البحث ابعاد العلاقات العراقية الايرانية قبل عام 2003 وما بعدها واهم المتغيرات الداخلية ( السياسية ، الاقتصادية ، الديموغرافية ، الامنية ) والخارجية ( الاقليمة ، الدولية المؤثرة عليها وافاقها المستقبلية

View Publication
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Self Purification in Al-Saqlawiya Drain in Abu-Grebe
...Show More Authors

Surface water flow samples were collected with distances downstream over Saqlawiya main drain whose stretch of about 24.5 km. The drain travels through different land use pattern, before, flowing into Tigris River. Eight sampling points were carefully
selected downstream the channel during dry season. The examined water parameters were pH, NH3, NO3, PO= 4, BOD5, COD, TDS, S.S, Cl-, SO= 4, Na+ , Ca+2, Mg+2, and Oil and Grease. Descriptive and inferential methods through finding the best curve fit correlation were employed in the study to test the strength of the association between water chemical characteristics and distance downstream the channel. A comparison of the values of chemical parameters at the Al-Saqlawiya Drain-Tigris Riv

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Ant Colony Optimization Based Force-Position Control for Human Lower Limb Rehabilitation Robot
...Show More Authors

The aim of human lower limb rehabilitation robot is to regain the ability of motion and to strengthen the weak muscles. This paper proposes the design of a force-position control for a four Degree Of Freedom (4-DOF) lower limb wearable rehabilitation robot. This robot consists of a hip, knee and ankle joints to enable the patient for motion and turn in both directions. The joints are actuated by Pneumatic Muscles Actuators (PMAs). The PMAs have very great potential in medical applications because the similarity to biological muscles. Force-Position control incorporating a Takagi-Sugeno-Kang- three- Proportional-Derivative like Fuzzy Logic (TSK-3-PD) Controllers for position control and three-Proportional (3-P) controllers for force contr

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Improvement of energy consumption in MIMO with cognitive radio networks
...Show More Authors

The employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 18 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks
...Show More Authors

Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the  Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co

... Show More
View Publication Preview PDF
Crossref (29)
Crossref
Publication Date
Tue Jan 18 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks
...Show More Authors

Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the  Random Waypoint model (RWP), Random Direction model (RD), Nomadic Co

... Show More
Scopus (53)
Crossref (29)
Scopus Crossref
Publication Date
Wed Jan 06 2021
Journal Name
Pierm
ULTRA-WIDEBAND FEATURING ENHANCED DELAY AND SUM ALGORITHM AND ORIENTED FOR DETECTING EARLY STAGE BREAST CANCER
...Show More Authors

Abstract—In this study, we present the experimental results of ultra-wideband (UWB) imaging oriented for detecting small malignant breast tumors at an early stage. The technique is based on radar sensing, whereby tissues are differentiated based on the dielectric contrast between the disease and its surrounding healthy tissues. The image reconstruction algorithm referred to herein as the enhanced version of delay and sum (EDAS) algorithm is used to identify the malignant tissue in a cluttered environment and noisy data. The methods and procedures are tested using MRI-derived breast phantoms, and the results are compared with images obtained from classical DAS variant. Incorporating a new filtering technique and multiplication procedure, t

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref