Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the server-based unfairness solutions for the cross-protocol scenario of the HAS/3 and HAS/2 is conducted. The results show that, while the bitrate guidance solution fails to help the clients achieve fairness, the bandwidth allocation solution provides superior performance.
In this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliab
... Show MoreBACKGROUND: Keratoconus is a progressive non inflammatory bilateral (usually asymmetric) ectatic corneal disease characterized by paraxial stromal thinning ,weakening that lead to corneal surface distortion ,vision loss primarily from irregular astigmatism and myopia and secondly from corneal scar. OBJECTIVE: To evaluate visual and refractive outcomes after intracorneal continuous ring (ICCR) implantation combined with intrapocket corneal collagen cross linking in patient with keratoconus. Setting: Eye Specialty Private Hospital, Baghdad, Iraq. METHODS: This study assessed the results of implantation of Myoring ICCR combined with CXL in 40 eyes with KC. Outcome measures include UDVA,CDVA(spectacle correction),refraction, complications and s
... Show MoreA great abbey in the Shari'a, and is therefore destined to be preserved in many texts and by methods
There are many prayers in the Qur'an and Sunnah to encourage them
They have a clear relationship with the preservation of the purposes of the Sharia in general, and with a purpose
Save the mind in particular, but the scholars - the mercy of God - when they declare that the costs of Sharia
Due to the preservation of my intentions in the creature, they limit their words to orders and intentions, and are not exposed
In particular,
If they were included in the texts of the Shariah and Tawjiyatiya,
To be related to the preservation of the purposes of the law, which confirms the words of the former leaders, and light the li
The effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1. What are the effects of Internet’s use on students?2. What is the relationship between the effects and demographic variables such as gender, age, family size an
... Show MoreClassical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T
... Show MoreAddition chloro acetyl isothiocyanate (C3H2ClNOS) with 3-Aminoaceto phenone (C8H9NO) to prepare a fresh Ligand [N-(3-acetyl phenyl carbamothioyl)-2-chloroacetamide](L). The ligand (L) behaves as bidentate coordinating through O and S donor with metal ions, the general formula of all complexes [M(L)2(Cl)2](M+2 = Manganese(II), Cobalt(II), Cadmium(II) and Mercury(II)). Compounds were investigation by Proton-1, Carbon -13 NMR spectra (ligand (L) only), Element Microanalysis for C, N, H, O, S, Fourier-transform infrared, UV visible, Conductance
This research aims to examine the effectiveness of a teaching strategy based on the cognitive model of Daniel in the development of achievement and the motivation of learning the school mathematics among the third intermediate grade students in the light of their study of "Systems of Linear Equations”. The research was conducted in the first semester (1439/1440AH), at Saeed Ibn Almosaieb Intermediate School, in Arar, Saudi Arabia. A quasi-experimental design has been used. In addition, a (pre & post) achievement test (20 Questions) and a (pre & post) scale of learning motivation to the school mathematics (25 Items) have been applied on two groups: a control group (31Students), and an experimental group (29 Students). The resear
... Show More The current research aims to highlight the role of human resource management with its practices (human resource planning, selection and placement, training and development, performance evaluation, compensation, and incentives) in raising the level of individuals' performance and its dimensions (task performance, contextual performance, unproductive work behavior, and adaptive performance) by explaining the research problem, which can be limited to the low level of performance of individuals, where the researchers use the descriptive analytical approach and the SPSS program in the practical aspect of the research community represented by the general manager and his assistant
Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin
... Show More