Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the server-based unfairness solutions for the cross-protocol scenario of the HAS/3 and HAS/2 is conducted. The results show that, while the bitrate guidance solution fails to help the clients achieve fairness, the bandwidth allocation solution provides superior performance.
The research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.
To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system while the second represents the period of time that followed
The research found a number of conclusions but the mo
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show More
The objective of this study is to measure the impact of financial development on economic growth in Iraq over the period (2004-2018) by applying a fully corrected square model (FMOLS) Whereas, a set of variables represented by (credit-to-private ratio of GDP, the ratio of money supply in the broad sense of GDP, percentage of bank deposits from GDP) were chosen as indicators for measuring financial development and GDP to measure economic growth.
Major tests have been carried out, such as the stability test (Unite Root Test), the integration test (Cointegration). Results of the study showed that there
... Show MoreThis paper deals the prediction of the process of random spatial data of two properties, the first is called Primary variables and the second is called secondary variables , the method that were used in the prediction process for this type of data is technique Co-kriging , the method is usually used when the number of primary variables meant to predict for one of its elements is measured in a particular location a few (because of the cost or difficulty of obtaining them) compare with secondary variable which is the number of elements are available and highly correlated with primary variables, as was the&nbs
... Show MoreThis research paper studies the alienation of the intellectuals in the modern novel through the study of two alienated characters, John Marcher in Henry James's The Beast in the Jungle, and Mr. Duffy in James's Joyce's "A Painful Case." As a result of the complexity of life in the industrial societies, the individuals, especially the intellectual ones, feel themselves unable to integrate into social life; they fear society and feel that it endangers their individuality and independence. Thus, these characters live on the fringe of the societ
... Show MoreThis work intends to illustrate the methods of using the authentic literary text in the process of spreading Italian, especially in Baghdad where there is a strong propensity to learn the Italian language. The concept of the language that arises from literature is an idea closely linked to the mentality of the Arab learner towards Italian culture: an idea also created by the first Arabisations of literary texts in the early years of the previous century. The research was carried out in Baghdad by two researchers, an Italianist from Baghdad and an Italian mother language linguist, with the aim of bringing together the two sectors in favor of the diffusion of the Italian language. The study also aims to clarify the models from Italian l
... Show MoreThis paper proposes an on-line adaptive digital Proportional Integral Derivative (PID) control algorithm based on Field Programmable Gate Array (FPGA) for Proton Exchange Membrane Fuel Cell (PEMFC) Model. This research aims to design and implement Neural Network like a digital PID using FPGA in order to generate the best value of the hydrogen partial pressure action (PH2) to control the stack terminal output voltage of the (PEMFC) model during a variable load current applied. The on-line Particle Swarm Optimization (PSO) algorithm is used for finding and tuning the optimal value of the digital PID-NN controller (kp, ki, and kd) parameters that improve the dynamic behavior of the closed-loop digital control fue
... Show More