The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.
The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g
... Show MoreThis paper is an attempt to clarify the impact of Postcolonialism, one of the most
challenging fields of study that has emerged in recent years, on representations of women in
once-colonised countries and in Western locations. It discusses the influence of cultural
differences on the status and identity of a woman who experience ‗multiculturalism‘. The
study is an analytical reading of a contemporary novel written by the Iraqi writer Betool Al-
Kudairi. The emphasis lies on the clash between two different cultures and traditions
represented by the British mother and the Iraqi father and its effect on the life and identity of
the protagonist. The main focus is on idea of ‗hybrid identity‘ and the absence of th
Background: Uncontrolled hyperphosphatemia is the main difficulty facing staff treating patients with end-stage renal disease on hemodialysis. Sevelamer and calcium-containing phosphate binders have been associated with cost burden and tissue calcification, respectively. Therefore, the current trial was targeted to investigate the efficacy of a new phosphate binder, ferric citrate, in a sample of Iraqi patients with end-stage renal disease on hemodialysis. Keywords: Ferric citrate, Hemodialysis Phosphate binder
The purpose of this research is to find the estimator of the average proportion of defectives based on attribute samples. That have been curtailed either with rejection of a lot finding the kth defective or with acceptance on finding the kth non defective.
The MLE (Maximum likelihood estimator) is derived. And also the ASN in Single Curtailed Sampling has been derived and we obtain a simplified Formula All the Notations needed are explained.
Rudimentary non-communicating functional uterine horn with unicornuate uterus, originating from anomalous embryological development of one Mullerian duct, is prone to different complications either at the gynecological or obstetrical level such as chronic pelvic pain, hematometra, subfertility and decreased quality of life. This unique case report presents a 14-year-old female with a history of severe chronic pelvic pain. She was diagnosed with Familial Mediterranean Fever (FMF) and had an appendectomy for suspected appendicitis within the symptoms’ interval. Ultrasound showed a right 5*6 cm right complex cystic mass assuming ovarian in place. She underwent a suspected endometrioma cystectomy operation and was diagnosed with left unico
... Show MoreThe paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)
Two‐dimensional buoyancy‐induced flow and heat transfer inside a square enclosure partially occupied by copper metallic foam subjected to a symmetric side cooling and constant heat flux bottom heating was tested numerically. Finite Element Method was employed to solve the governing partial differential equations of the flow field and the Local Thermal Equilibrium model was used for the energy equation. The system boundaries were defined as lower heated wall by constant heat flux, cooled lateral walls, and insulated top wall. The three parameters elected to conduct the study are heater length (7 ≤
The dependence of the energy losses or the stopping power for the ion contribution in D- T hot plasma fuels upon the corresponding energies and the related penetrating factorare arrive by using by a theoretical approximation models. In this work we reach a compatible agreement between our results and the corresponding experimental results.
The electrical activity of the heart and the electrocardiogram (ECG) signal are fundamentally related. In the study that has been published, the ECG signal has been examined and used for a number of applications. The monitoring of heart rate and the analysis of heart rhythm patterns, the detection and diagnosis of cardiac diseases, the identification of emotional states, and the use of biometric identification methods are a few examples of applications in the field. Several various phases may be involved in the analysis of electrocardiogram (ECG) data, depending on the type of study being done. Preprocessing, feature extraction, feature selection, feature modification, and classification are frequently included in these stages. Ever
... Show More