Internet paths sharing the same congested link can be identified using several shared congestion detection techniques. The new detection technique which is proposed in this paper depends on the previous novel technique (delay correlation with wavelet denoising (DCW) with new denoising method called Discrete Multiwavelet Transform (DMWT) as signal denoising to separate between queuing delay caused by network congestion and delay caused by various other delay variations. The new detection technique provides faster convergence (3 to 5 seconds less than previous novel technique) while using fewer probe packets approximately half numbers than the previous novel technique, so it will reduce the overload on the network caused by probe packets. Thus, new detection technique will improve the overall performance of computer network.
There is a mutual relationship between the form of a text and its meaning so as separating these two or devaluating the role of one of them leads to the absence of the value therein. Thus, a translation is important as to how it relates the details of a text. That is, the text has special features which go beyond form, and these set out its distinctiveness. Here, we tackle Saleh al-Jafari's Arabic translation of "Rubbayat al-Khayyam" of Naysapour descriptively and analytically by depending on extracts from the original text. This translation is evaluated on the basis of Spanish critic Maria Carmen Valero Garces. Herein, we discuss the effectiveness of this theory in the criticism of literary texts. It has been concluded that al-Jaf
... Show MoreThe phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the internal environment of the organization in addressing this behavior, being the variables belong to the field of organizational behavior to see the results of those variables on the Iraqi organizations, since the specificities of it differ from the rest of the Arab and foreign environments. Therefore, this study focused on testing the relationship of the internal environment of the organization and its role in addressing the negative behavior of the workers.
thi
... Show MoreThe uptake of Cd(II) ions from simulated wastewater onto olive pips was modeled using artificial neural network (ANN) which consisted of three layers. Based on 112 batch experiments, the effect of contact time (10-240 min), initial pH (2-6), initial concentration (25-250 mg/l), biosorbent dosage (0.05-2 g/100 ml), agitation speed (0-250 rpm) and temperature (20-60ºC) were studied. The maximum uptake (=92 %) of Cd(II) was achieved at optimum parameters of 60 min, 6, 50 mg/l, 1 g/100 ml, 250 rpm and 25ºC respectively.
Tangent sigmoid and linear transfer functions of ANN for hidden and output layers respectively with 7 neurons were sufficient to present good predictions for cadmium removal efficiency with coefficient of correlatio
... Show MoreIn this study, a new adsorbent derived from sunflower husk powder and coated in CuO nanoparticles (CSFH) was investigated to evaluate the simultaneous adsorption of Levofloxacin (LEV), Meropenem (MER), and Tetracycline (TEC) from an aqueous solution. Significant improvements in the adsorption capacity of the sunflower husk were identified after the powder particles had been coated in CuO nanoparticles. Kinetic data were correlated using a pseudo-second-order model, and was successful for the three antibiotics. Moreover, high compatibility was identified between the LEV, MER, and TEC, isotherm data, and the Langmuir model, which produced a better fit to suit the isotherm curves. In addition, the spontaneous and exothermic nature of the adsor
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreThe aim of this study is to identify the effect of enabling the effectiveness of the work of the audit committees in private commercial banks and to identify the extent of awareness of the importance of empowerment in the work of these committees, especially as it is known that these committees, especially the inspection committees that go to private banks and from various sources including committees of the Central Bank of Iraq Committees of the Securities Commission and finally committees of the external audit offices, through an analysis of the determinants of empowerment in the performance of the most important work of the audit committees, namely: supervising the process of preparing reports, supervising the system of intern
... Show MoreThe Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without
... Show MoreSatire is genre of the literary arts that has always been the source of human interest. Because it is difficult to accept direct criticism, Satire appears as a literary tool in which vices, follies, abuses and shortcomings are held up to ridicule, with the intent of shaming individuals, corporations, government, or society itself into improvement. A satirical critic usually employs irony to attain this goal. Although satire is usually meant to be humorous, its greater purpose is often profitable social criticism, using wit to draw at
... Show MoreThe science of jurisprudence is one of the legal sciences that scholars have been interested in since the first centuries of Islam, and they wrote many books about it, and the science of manuscripts is considered one of the scientific achievements in which many scholars emerged, including Imam Al-Samaani, so I chose this manuscript related to Istism to clarify its concept and meaning for all people, The student (Ali Ahmed Abdel-Aziz Sheikh Hamad) preceded me in the investigation of part of the book, and it was facilitated for me, by the grace of God Almighty, to investigate the issue (if one of the Muslim spouses apostatized and one of the infidel spouses converted to Islam until the end of the issue of if the two spouses were taken capt
... Show MoreThe railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st
... Show More