Preferred Language
Articles
/
bsj-3949
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the client at the network boundary. The present research paper proposes priority weighted round robin (PWRR) algorithm for streaming operations scheduling in the fog architecture. This will give preemptive for streaming live video request to be delivered in a very short response time and real-time communication. The results of experimenting the PWRR in the proposed architecture display a minimize latency and good quality of live video requests which has been achieved with bandwidth changes as well as meeting all other clients requests at the same time

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 28 2020
Journal Name
Neuroquantology
Using X-Ray Films for Evaluation efficiency of Unsaturated Polyester Reinforced by Lead Oxide as Shielding for Medical X-ray Devices
...Show More Authors

The largest use of x-ray in medical by dentists, employers or persons that needed by patients with specific conditions, lead to higher exposure of x-ray that may cause many diseases. In the present work radiography films have been used in evaluating the efficiency of using unsaturated polyester polymer reinforced with lead oxide (PbO) as shield material for medical x-ray devices, many parameters studied like concentration and thickness that they are increasing the attenuation of x-ray in them. The results show that the attenuation of X-ray increasing with concentration of reinforced material and with thickness, and the optical density decreases with increasing concentration from 0% to 50%, we chose 30% as suitable concentration to increase

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The impact of strategic innovation components of the application Business process re-engineering: A survey Study of the consultant of a sample of managers and their assistants and consultants in the General Company for Post & Telecommunications
...Show More Authors

Abstract:

        Organizations need today to move towards strategic innovation, which means the analysis of positions, especially the challenges faced by the change in the external environment, which makes it imperative for the organization that you reconsider their strategies and orientations and operations, a so-called re-engineering to meet those challenges and pressures. Now this research dilemma intellectual two-dimensional, yet my account in not Take writings and researchers effect strategic innovation in re-engineering business processes, according to science and to inform the researcher, and after the application represented in the non-application of such resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Vostok. Afro-aziatskie Obshchestva: Istoriia I Sovremennost
The carrier of word-formation meaning in russian and arabic gramatic traditions: the word model in the russian-arabic translation algorithm
...Show More Authors

The article is devoted to the Russian-Arabic translation, a particular theory of which has not been developed in domestic translation studies to the extent that the mechanisms of translation from and into European languages are described. In this regard, as well as with the growing volumes of Russian-Arabic translation, the issues of this private theory of translation require significant additions and new approaches. The authors set the task of determining the means of translation (cognitive and mental operations and language transformations) that contribute to the achievement of the most equivalent correspondences of such typologically different languages as Russian and Arabic. The work summarizes and analyzes the accumulated exper

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Journal Of Next Generation Information Technology
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ELECTROCHEMICAL PREPARATION OF A MOLECULAR IMPRINTED POLYMER ELECTRODE FOR ESTEMATION OF ASPIRIN USING TWO DIFFERENT FUNCTIONAL MONOMERS.: ELECTROCHEMICAL PREPARATION OF A MOLECULAR IMPRINTED POLYMER ELECTRODE FOR ESTEMATION OF ASPIRIN USING TWO DIFFERENT FUNCTIONAL MONOMERS.
...Show More Authors

For aspirin estimated, a molecularly imprinted polymer MIP-ASP electrodes were generated by electro-polymerization process, the electrodes were prepared by combining the template (aspirin) with (vinyl acetate (VA), 1-vinylimidizole (VIZ) as a functional monomer and N, N-methylene bisacrylamide (MBAA) as crosslinkers using benzoyl peroxide (BPO) as an initiator. The efficiency of the membrane electrodes was analyzed by differential pulse voltammetry (DPV). Four electrodes were synthesized using two different plasticizers, di-butyl sebacate (DBS), di-octyl phthalate (DOP) in PVC matrix. Scanning electron microscopy (SEM) was used to describe the generated MIP, studying the electrodes properties, the slope, detection limit, and life

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Dosimetric Verification of Gamma Passing Rate for Head and Neck Cases Treated with Intensity Modulated Radiation Therapy (IMRT) Treatment Planning Technique
...Show More Authors

Each Intensity Modulated Radiation Therapy (IMRT) plan needs to be tested and verified before any treatment to check its quality. Octavius 4D-1500 phantom detector is a modern and qualified device for quality assurance procedure. This study aims to compare the common dosimetric criteria 3%/3 mm with 2%/2 mm for H&N plans for the IMRT technique. Twenty-five patients with head and neck (H&N) tumor were with 6MV x-ray photon beam using Monaco 5.1 treatment planning software and exported to Elekta synergy linear accelerator then tested for pretreatment verification study using Octavius 4D-1500 phantom detector. The difference between planned and measured dose were assessed by using local and global gamma index (GI) analysis method at

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Public key system by using isomorphism group
...Show More Authors

In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the impact of internal control on tax performance using balanced score card indicators: An applied research in a sample of the branches of the General Tax Authority in Iraq
...Show More Authors

This research dealt with the impact of internal control on tax performance using balanced scorecard indicators because of its special importance in improving tax performance and reform. The internal control system is a safety valve for senior management in all organizations, it plays an important role in the regularity and development of work and the fight against corruption To provide reliable and accurate data and information, follow up on compliance with laws, regulations and instructions. The aim of this research is to demonstrate how control affects tax performance and how to adapt internal control components to improve tax performance. In the General Authority for taxes and its branches,. The research resulted in a number of conclu

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 12 2017
Journal Name
Journal Of Engineering
Prepare rules spatial data for soils and the Calculation of an Area in Iraq for Industrial Purposes using Geographic Information Systems (GIS)
...Show More Authors

 
      The process of soil classification in Iraq for industrial purposes is important topics that need to be extensive and specialized studies. In order for the advancement of reality service and industrial in our dear country, that a lot of scientific research touched upon the soil classification in the agricultural, commercial and other fields. No source and research can be found that touched upon the classification of land for industrial purposes directly. In this research specialized programs have been used such as geographic information system software The geographical information system permits the study of local distribution of phenomena, activities and the aims that can be determined in the loca

... Show More
View Publication Preview PDF