Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject area is the optimal self-organized service placement. In this paper a heuristic-based algorithm for service placement in future networks was presented. This algorithm achieves the ideal placement of services replicas by monitoring the load within the server and its neighborhood, choosing the node that contributes with the highest received load, and finally replicating or migrating the service to it based on specific criteria, so that the distance of requests coming from clients becomes as small as possible because of placing services within nearby locations. It was proved that our proposed algorithm achieves an improved performance by meeting the services within a shorter time, a smaller bandwidth, and thus a lower communication cost. It was compared with the traditional client-server approach and the random placement algorithm. Experimental results showed that the heuristic algorithm outperforms other approaches and meets the optimal performance with different network sizes and varying load scenarios.
Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreImproved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN
... Show MoreSelf control is the perception of the individual of his duty at, the capacity of self testing in systematic durations and the ability of individuate to control his behavior, The control will be spontaneous when the individual will have a special ideas about the correct or incorrect behavior and choosing his way according it.
The present study airs at:
1- building and measuring self control and balancing among means among university students according to gender and specialization.
To achieve the above mention aim, the two researchers built a scale of self control depending on some theories and applying it on a sample consists of (400) male and female students in Baghdad university studying in scientific and human fields. The two
Basic orientation is to look at identifying conceptual perspective to market self-research and descriptive, as has the marketing theme for the same attention in the practical side before endo scopic In recent years, is marketing an integrated and holistic included many areas not limited to the marketing of goods and services, and even included the marketing of religion, politics and individuals for themselves, as the awareness and concepts that seep into the soul of man from its inception until his arrival to the stage of owning a level of skills or expertise, scientific or all of those things degrees mixed with ambition and aspiration for self-realization takes way to search for opportunities or created, often observe individual
... Show MoreThis research investigates the type and the significant relationship between roaming management and self-efficacy and its impact on excellence in providing hotel service. To achieve this, the applied approach was adopted through A questionnaire was designed and developed for the collected data. It has consisted of three parts. The firsts section included nine questions to measure the dimensions of management by roaming. The second section includes nine questions to measure the effectiveness of the two employees. The last section includes 12 questions to measure the excellence of the hotel service. The research sample included 43 employees' responding to this
... Show MoreBackground׃ Halitosis is a common condition and is most often caused by a buildup of bacteria in the mouth because of gum disease, food, or plaque. It can result in anxiety among those affected, it is also associated with depression and symptoms of obsessive compulsive disorder. The aim of this study isto assess the prevalence of self-reported halitosis and associated factors (dental plaque, gingival condition and dental caries) in 15 years old male students in Karbala city in Iraq. Additionally, we studied adolescents’ concern with their own breath and whether anyone had ever told them that they had halitosis. Methods׃ A cross sectional observational survey was conducted to15 years old high school students from public and p
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreIran Regional and Foreign Security Policies Gulf. The long history of regional and other conflicts which their severity increased because of appearance of modern states and cultural and lingual ancient differences resulted in deep feeling of doubt and suspicion between Iran and its Arab neighbors .Meanwhile the two sides have several interests common points , the moist important is the strategic and commercial interests . The fears and objective procedures based on the continuing evaluation of Iran abilities and needs direct security policies in internal and foreign affairs concerning the world in Gulf specially.