The most popular medium that being used by people on the internet nowadays is video streaming. Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the client at the network boundary. The present research paper proposes priority weighted round robin (PWRR) algorithm for streaming operations scheduling in the fog architecture. This will give preemptive for streaming live video request to be delivered in a very short response time and real-time communication. The results of experimenting the PWRR in the proposed architecture display a minimize latency and good quality of live video requests which has been achieved with bandwidth changes as well as meeting all other clients requests at the same time
Wind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc
... Show MoreMany objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show MoreAutism Spectrum Disorder, also known as ASD, is a neurodevelopmental disease that impairs speech, social interaction, and behavior. Machine learning is a field of artificial intelligence that focuses on creating algorithms that can learn patterns and make ASD classification based on input data. The results of using machine learning algorithms to categorize ASD have been inconsistent. More research is needed to improve the accuracy of the classification of ASD. To address this, deep learning such as 1D CNN has been proposed as an alternative for the classification of ASD detection. The proposed techniques are evaluated on publicly available three different ASD datasets (children, Adults, and adolescents). Results strongly suggest that 1D
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreRenewable energy technology is growing fast especially photovoltaic (PV) system to move the conventional electricity generation and distribution towards smart grid. However, similar to monthly electricity bill, the PV energy producers can only monitor their energy PV generation once a month. Any malfuntion in PV system components may reduce the performance of the system without notice. Thus, developing a real-time monitoring system of PV production is very crucial for early detection. In addition, electricity consumption is also important to be monitored more frequently to increase energy savings awareness among consumers. Hardware based Internet-of-Thing (IoT) monitoring and control system is widely used. However, the implementation of
... Show MoreLaser drilling is capable of producing small, precisely positioned holes with high degree of reproductively. In this paper , IR millisecond Nd:YAG single pulsed laser was used to determine the effect of laser parameters on the drilled hole of the glass - fiber reinforced epoxy composite FR-4 sample of 2 mm in thickness . The type of laser source was GSI lumonics JK760TR Series laser 1.064μm system in a CNC cabin. The JK760TR series has a 0.3-50ms pulse length and a maximum repetition rate 500Hz with an average power of 600W. The investigation of single pulse laser drilling in this paper was based on theoretical and experimental solutions. In single pulse technique, the investigation included focal plane position fpp, pulse shap
... Show MoreThe simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was
... Show MoreIn this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreThis investigation was carried out to study the treatment and recycling of wastewater in the Battery industry for an effluent containing lead ion. The reuse of such effluent can only be made possible by appropriate treatment method such as electro coagulation.
The electrochemical process, which uses a cell comprised aluminum electrode as anode and stainless steel electrode as cathode was applied to simulated wastewater containing lead ion in concentration 30 – 120 mg/l, at different operational conditions such as current density 0.4-1.2 mA/cm2, pH 6 -10 , and time 10 - 180 minute.
The results showed that the best operating conditions for complete lead removal (100%) at maximum concentration 120 mg/l was found to be 1.2 mA/cm2 cur
Our goal from this work is to find the linear prediction of the sum of two Poisson process
) ( ) ( ) ( t Y t X t Z + = at the future time 0 ), ( ≥ + τ τ t Z and that is when we know the values of
) (t Z in the past time and the correlation function ) (τ βz