Preferred Language
Articles
/
bsj-3949
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the client at the network boundary. The present research paper proposes priority weighted round robin (PWRR) algorithm for streaming operations scheduling in the fog architecture. This will give preemptive for streaming live video request to be delivered in a very short response time and real-time communication. The results of experimenting the PWRR in the proposed architecture display a minimize latency and good quality of live video requests which has been achieved with bandwidth changes as well as meeting all other clients requests at the same time

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Mothers’ Knowledge about Their Children with Sickle Cell Anemia and Non-Pharmacological Approaches to Pain Management in Basra Center for Hereditary Blood Diseases
...Show More Authors

Objective(s): To assess mothers’ knowledge about their children with sickle cell anemia and non-Pharmacological approaches to pain management and found some relationship between mothers knowledge and their demographic data of age, level of education, and occupation.
Methodology: A descriptive design used in the present study established was for a period from September 19th, 2020 to March 30th, 2021. The study was conducted on a non-probability (purposive) sample of (30) mother their children with sickle cell anemia was chosen. The data were analyzed through the application of descriptive and inferential statistical approaches which are applied by using SPSS version 22.0.
Results: The findings of the study indicated that moderate

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 14 2020
Journal Name
Baghdad Science Journal
The Green Synthesize of Zinc Oxide Catalyst Using Pomegranate Peels Extract for the Photocatalytic Degradation of Methylene Blue Dye
...Show More Authors

In this study, the zinc oxide NPs have been synthesized from the fresh pomegranate peels extract using the precipitation method. The ZnO nanoparticles were produced from the reaction of fresh peels extract with zinc acetate salt which was used as zinc source in the presence of 2 M NaOH. The green synthesized nanoparticles were characterized through X-ray diffraction (XRD), UV-Vis diffuse reflection spectroscopy, Fourier transform infrared spectroscopy (FTIR), and Atomic force microscopy (AFM). The XRD patterns confirm the formation of hexagonal wurtzite phase structure for ZnO synthesized using pomegranate peels extract with average crystalline size of 28 nm. FTIR spectra identify the presence of many active functional groups for the pom

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 16 2017
Journal Name
Joiv : International Journal On Informatics Visualization
Multilayered Framework to Enhance Management Information Systems Decision on Sensitive Data in Cloud Computing Environment
...Show More Authors

The purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Consideration of Worker Safety in the Design Process: A Statistical-Based Approach Using Analysis of Variance (ANOVA)
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Engineering
Cultivation of Chlorella Vulgaris Using Airlift Photobioreactor Sparged with 5%CO 2 -Air as a Biofixing Process
...Show More Authors

The present paper addresses cultivation of Chlorella vulgaris microalgae using airlift photobioreactor that sparged with 5% CO 2 /air. The experimental data were compared with that obtained from bioreactor aerated with air and unsparged bioreactor. The results showed that the concentration of biomass is 0.36 g l -1  in sparged bioreactor with CO2/air, while, the concentration of biomass reached to 0.069 g l -1  in the unsparged bioreactor. They showed also that aerated  ioreactor.with CO2/air gives more biomass production even the bioreactor was aerated with air. This study proved that application of sparging system for  ultivation of Chlorella vulgaris microalgae using either CO2/air mixture or air has a significant

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Factors Affecting the Extraction Process
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Oct 10 2022
Journal Name
International Journal Of Mathematics In Operational Research
Modelling time-series process of an agricultural crop production process by EWMA quality control chart
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref