Preferred Language
Articles
/
bsj-6338
Distributed Heuristic Algorithm for Migration and Replication of Self-organized Services in Future Networks
...Show More Authors

Nowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject area is the optimal self-organized service placement. In this paper a heuristic-based algorithm for service placement in future networks was presented. This algorithm achieves the ideal placement of services replicas by monitoring the load within the server and its neighborhood, choosing the node that contributes with the highest received load, and finally replicating or migrating the service to it based on specific criteria, so that the distance of requests coming from clients becomes as small as possible because of placing services within nearby locations. It was proved that our proposed algorithm achieves an improved performance by meeting the services within a shorter time, a smaller bandwidth, and thus a lower communication cost. It was compared with the traditional client-server approach and the random placement algorithm. Experimental results showed that the heuristic algorithm outperforms other approaches and meets the optimal performance with different network sizes and varying load scenarios.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Estimating Pitting Corrosion Depth and Density on Carbon Steel (C-4130) using Artificial Neural Networks
...Show More Authors

The purpose of this research is to investigate the impact of corrosive environment (corrosive ferric chloride of 1, 2, 5, 6% wt. at room temperature), immersion period of (48, 72, 96, 120, 144 hours), and surface roughness on pitting corrosion characteristics and use the data to build an artificial neural network and test its ability to predict the depth and intensity of pitting corrosion in a variety of conditions. Pit density and depth were calculated using a pitting corrosion test on carbon steel (C-4130). Pitting corrosion experimental tests were used to develop artificial neural network (ANN) models for predicting pitting corrosion characteristics. It was found that artificial neural network models were shown to be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Research In Science And Technology
Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map
...Show More Authors

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascad

... Show More
View Publication
Crossref
Publication Date
Mon Feb 28 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Flying Ad hoc Networks (FANET): Performance Evaluation of Topology Based Routing Protocols
...Show More Authors

Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conduct

... Show More
View Publication Preview PDF
Crossref (29)
Crossref
Publication Date
Tue Jan 27 2026
Journal Name
Journal Of Physical Education
The Effect of Breathing Exercises on Relation and Self – Talk on Developing Ambition Level According to VTS – Sport and Achievement in Long Distance Runners
...Show More Authors

View Publication
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Psychological Flow and its Association with Psychological Well-Being and Self –Management among a Sample of Fine Artists in Makkah Region Haneen Hussain Daggas
...Show More Authors

Abstract

The research aims to examine the relationship between psychological flow, psychological well-being, and self-management among a sample of fine artists in the Makkah region and its governorates. The research also aims to examine the mean group differences in psychological flow, psychological well-being, and self-management due to demographic variables (sex and years of practicing arts). The sample consists of (110) male and female fine artists. The descriptive correlational approach was performed to collect the data by using the psychological flow scale developed by Payne et al (2011), which was translated by the researcher, the Oxford happiness questionnaire developed by Hills and Argyle (2002), it has t

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 02 2019
Journal Name
Fibers
Experimental Investigation of the Behavior of Self-Form Segmental Concrete Masonry Arches
...Show More Authors

This research aims to introduce a new technique-off-site and self-form segmental concrete masonry arches fabrication, without the need of construction formwork or centering. The innovative construction method in the current study encompasses two construction materials forms the self-form masonry arches, wedge-shape plain concrete voussoirs, and carbon fiber-reinforced polymer (CFRP) composites. The employment of CFRP fabrics was for two main reasons: bonding the voussoirs and forming the masonry arches. In addition, CFRP proved to be efficient for strengthening the extrados of the arch rings under service loadings. An experimental test was conducted on four sophisticated masonry arch specimens. The research parameters were the Keystone thic

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Influence of Internal Sulfate Attack on Some Properties of Self Compacted Concrete
...Show More Authors

      Self-compacted concrete (SCC) is a highly flowable concrete, with no segregation which can be spread into place by filling the structures framework and permeate the reinforcement without any compaction or mechanical consolidation ACI 237R-14. One of the most important problems faced by concrete industry in Iraq and Gulf Arab land is deterioration due to internal sulfate attack (ISA) that causes damage of concrete and consequently reduces its compressive strength, increases expansion and may lead to its cracking and destruction. The experimental program was focused to study two ordinary Portland cements with different chemical composition with (5, 10 and 15) % percentage of high reactivity metakaoline (HRM)

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2024
Journal Name
Renewable And Sustainable Energy Reviews
A critical review on the efficient cooling strategy of batteries of electric vehicles: Advances, challenges, future perspectives
...Show More Authors

View Publication
Scopus (59)
Crossref (70)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aims Mathematics
Solving quaternion nonsymmetric algebraic Riccati equations through zeroing neural networks
...Show More Authors

<abstract><p>Many variations of the algebraic Riccati equation (ARE) have been used to study nonlinear system stability in the control domain in great detail. Taking the quaternion nonsymmetric ARE (QNARE) as a generalized version of ARE, the time-varying QNARE (TQNARE) is introduced. This brings us to the main objective of this work: finding the TQNARE solution. The zeroing neural network (ZNN) technique, which has demonstrated a high degree of effectiveness in handling time-varying problems, is used to do this. Specifically, the TQNARE can be solved using the high order ZNN (HZNN) design, which is a member of the family of ZNN models that correlate to hyperpower iterative techniques. As a result, a novel

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More