The Next-generation networks, such as 5G and 6G, need capacity and requirements for low latency, and high dependability. According to experts, one of the most important features of (5 and 6) G networks is network slicing. To enhance the Quality of Service (QoS), network operators may now operate many instances on the same infrastructure due to configuring able slicing QoS. Each virtualized network resource, such as connection bandwidth, buffer size, and computing functions, may have a varied number of virtualized network resources. Because network resources are limited, virtual resources of the slices must be carefully coordinated to meet the different QoS requirements of users and services. These networks may be modified to achieve QoS using Artificial Intelligence (AI) and machine learning (ML). Developing an intelligent decision-making system for network management and reducing network slice failures requires reconfigurable wireless network solutions with machine learning capabilities. Using Spiking Neural Network (SNN) and prediction, we have developed a 'Buffer-Size Management' model for controlling network load efficiency by managing the slice's buffer size. To analyze incoming traffic and predict the network slice buffer size; our proposed Buffer-Size Management model can intelligently choose the best amount of buffer size for each slice to reduce packet loss ratio, increase throughput to 95% and reduce network failure by about 97%.
The education, especially higher education, is an essentially factor in the progress of any society, if we consider the higher education, represents the top of the education`s pyramid which take part in developing the human resources and provide the human staff to raise the productive efficiency, and improve the social , economic level
In order to face the increasing importance of higher education, great capabilities and expenditures must be available in a continous way, such expe
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara
... Show MoreSolid dispersion (SD) is one of the most widely used methods to resolve issues accompanied by poorly soluble drugs. The present study was carried out to enhance the solubility and dissolution rate of Aceclofenac (ACE), a BCS class II drug with pH-dependent solubility, by the SD method. Effervescent assisted fusion technique (EFSD) using different hydrophilic carriers (mannitol, urea, Soluplus®, poloxamer 188, and poloxamer 407) in the presence of an effervescent base (sodium bicarbonate and citric acid) in different drug: carrier: effervescent base ratio and the conventional fusion technique (FSD) were used to prepare ACE SD. Solubility, dissolution rate, Fourier transformation infrared spectroscopy (FTIR), PowderX-ray diffraction
... Show MoreBackground: Neural tube defects (NTDs) are said to be inherited in a multifactorial fashion, i.e. genetic-environmental interaction. Maternal nutritional deficiencies had long been reported to cause NTDs, especially folate deficiency during early pregnancy. More attention had been paid to the exact mechanism by which this deficiency state causes these defects in the developing embryo. The most significant of all researches was that connecting reduced folate and increased homocysteine level in maternal serum on one hand and the risk of developing a NTD baby on the other hand. Objectives : to determine the significance of homocysteine level in Iraqi mothers who gave birth to babies with NTDs as compared to normal controls. Patients, Materials
... Show MoreThe study aims to predict Total Dissolved Solids (TDS) as a water quality indicator parameter at spatial and temporal distribution of the Tigris River, Iraq by using Artificial Neural Network (ANN) model. This study was conducted on this river between Mosul and Amarah in Iraq on five positions stretching along the river for the period from 2001to 2011. In the ANNs model calibration, a computer program of multiple linear regressions is used to obtain a set of coefficient for a linear model. The input parameters of the ANNs model were the discharge of the Tigris River, the year, the month and the distance of the sampling stations from upstream of the river. The sensitivity analysis indicated that the distance and discharge
... Show MoreDue to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical
... Show MoreAbstract
Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim
... Show More