Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noising tool to reduce the effects of both clock skew and queuing delay fluctuations on the decision of congestion type. Since, classical Discrete Wavelet Transform (DWT) is not shift-invariant transform which is a very useful property particularly in signal de-noising problems. Therefore, another transform called Stationary Wavelet Transform (SWT) that possesses shiftinvariant property is suggested and used instead of DWT. The modified technique exhibits a better performance in terms of the time required to correctly detect the state of congestion especially with the existence of clock skew problem. The suggested technique is tested using simulations under different
environments.
This paper presents a complete design and implementation of a monitoring system for the operation of the three-phase induction motors. This system is built using a personal computer and two types of sensors (current, vibration) to detect some of the mechanical faults that may occur in the motor. The study and examination of several types of faults including (ball bearing and shaft misalignment faults) have been done through the extraction of fault data by using fast Fourier transform (FFT) technique. Results showed that the motor current signature analysis (MCSA) technique, and measurement of vibration technique have high possibility in the detection and diagnosis of most mechanical faults with high accuracy. Subsequently, diagnosi
... Show MoreINTRODUCTION: A range of tools and technologies are at disposal for the purpose of defect detection. These include but are not limited to sensors, Statistical Process Control (SPC) software, Artificial Intelligence (AI) and machine learning (ML) algorithms, X-ray systems, ultrasound systems, and eddy current systems. OBJECTIVES: The determination of the suitable instrument or combination of instruments is contingent upon the precise production procedure and the category of flaw being identified. In certain cases, defects may necessitate real-time monitoring and analysis through the use of sensors and SPC software, whereas more comprehensive analysis may be required for other defects through the utilization of X-ray or ultrasound sy
... Show MoreBeta-thalassemia major (β-TM) is inheritable condition with many complications especially in children. The blood-borne viral infection was proposed as a risk factor due to recurrent blood transfusion regimen (hemotherapy).
This study aimed to investigate Human parvovirus B19 (PVB19) prevalence in β-TM patients by serological and molecular means.
This is a cross-section
Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreDBNRAHA Hameed, IJRSSH PUBLICATION, 2018
Dell Hymesin 1964coined The Ethnography of Communication in an attempt to explain the ways in which people use the language to interact. It hypothesizes that ethnography is less applicable among participants who have the same sociocultural background. It was proven that all the basic speech components occur whenever there is an interactional situation. The elements of (SPEAKING) schema are closely connected. However, the findings establish the fact that these elements take place effectively among participants who have the same sociocultural background.One of the most outstanding conclusions is the capability of the (SPEAKING) model to analyze not only an interaction between two or more participants, but also any event which consists of a mo
... Show MoreAbstract The study aimed at reviewing translation theories proposed to address problems in translation studies. To the end, translation theories and their applications were reviewed in different studies with a focus on issues such as critical discourse analysis, cultural specific items and collocation translation.
Abstract: The premise of the study is that populism is a process of building political views and critical intellectual orientations among the general public. It is transformed into mass beliefs by mobilizing the society ideologically and continuously in order to reach or control the circle of authority. We distributed the study topics to four sections: In the second, we will discuss the contents of contemporary populism and how other forms of populism evolved historically. The third is to discuss the political discourse of populism among the military regimes and the comparative Islamic parties in the Middle East, especially in terms of the essence and the intellectual foundations. The fourth section seeks to examine the characteristics o
... Show More