Video streaming is widely available nowadays. Moreover, since the pandemic hit all across the globe, many people stayed home and used streaming services for news, education, and entertainment. However, when streaming in session, user Quality of Experience (QoE) is unsatisfied with the video content selection while streaming on smartphone devices. Users are often irritated by unpredictable video quality format displays on their smartphone devices. In this paper, we proposed a framework video selection scheme that targets to increase QoE user satisfaction. We used a video content selection algorithm to map the video selection that satisfies the user the most regarding streaming quality. Video Content Selection (VCS) are classified into video attributes groups. The level of VCS streaming will gradually decrease to consider the least video selection that users will not accept depending on video quality. To evaluate the satisfaction level, we used the Mean Opinion Score (MOS) to measure the adaptability of user acceptance towards video streaming quality. The final results show that the proposed algorithm shows that the user satisfies the video selection, by altering the video attributes.
The Objective of the research is to identify the Strategic Vigilance and effect in the Managerial Decision Quality, by knowing the interest of the organization influence the Strategic Vigilance in the Managerial Decision Quality, adopted four dimensions of the Strategic Vigilance is (Environmental Vigilance, Commercial, Competitiveness & Technology) to indicate the extent individually and collectively impact in the Managerial Decision Quality, The questionnaire was used as a main tool to survey the views of a sample of 45 managers, was named Supreme Judicial Council society for research, and the statistical program SPSS, and research found a clear positive impact dimensions Strategic Vigilance in the Manageri
... Show MoreThis research is based on interaction of two most important variables to the business organizations in the current era , these two variables are (marketing orientation and quality of service), this research is trying to urge the service organizations to reconsider the mechanisms adopted in the formulation of its plans, It was the application of research in Korek Telecom and Asia Cell Telecom as a sector of service active and important in the business sector in Iraq, the information was obtained through the design of the Likert questionnaire , it was distributed (92) questionnaire , (50) for the company Korek Telecom and (42) of the Asia-Cell and represent research population sample
... Show MoreFatigue failure is almost considered as the predominant problem affecting automotive parts under dynamic loading condition. Thus, more understanding of crack behavior during fatigue can strongly help in finding the proper mechanism to avoid the final fracture and extent the service life of components. The main goal of this paper is to study the fracture behavior of low carbon steel which is used mostly in automotive industry. For this purpose, the fractography of samples subjected to high and low stress levels in fatigue test then was evaluated and analyzed. Hardness and tensile tests were carried out to determine the properties of used steel. Also, the samples were characterized by microstructure test and XRD analysis to examine the con
... Show MoreIn the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa
... Show MoreDue to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.
In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py
... Show MoreAbstract: -
The concept of joint integration of important concepts in macroeconomic application, the idea of cointegration is due to the Granger (1981), and he explained it in detail in Granger and Engle in Econometrica (1987). The introduction of the joint analysis of integration in econometrics in the mid-eighties of the last century, is one of the most important developments in the experimental method for modeling, and the advantage is simply the account and use it only needs to familiarize them selves with ordinary least squares.
Cointegration seen relations equilibrium time series in the long run, even if it contained all the sequences on t
... Show MoreTo ascertain the stability or instability of time series, three versions of the model proposed by Dickie-Voller were used in this paper. The aim of this study is to explain the extent of the impact of some economic variables such as the supply of money, gross domestic product, national income, after reaching the stability of these variables. The results show that the variable money supply, the GDP variable, and the exchange rate variable were all stable at the level of the first difference in the time series. This means that the series is an integrated first-class series. Hence, the gross fixed capital formation variable, the variable national income, and the variable interest rate
... Show MoreReal Time Extended (RTX) technology works to take advantage of real-time data comes from the global network of tracking stations together with inventor locating and compression algorithms to calculate and relaying the orbit of satellite, satellite atomic clock, and any other systems corrections to the receivers, which lead to real-time correction with high accuracy. These corrections will be transferred to the receiver antenna by satellite (where coverage is available) and by IP (Internet Protocol) for the rest of world to provide the accurate location on the screen of smartphone or tablet by using specific software. The purpose of this study was to assess the accuracy of Global Navig
Real Time Extended (RTX) technology works to take advantage of real-time data comes from the global network of tracking stations together with inventor locating and compression algorithms to calculate and relaying the orbit of satellite, satellite atomic clock, and any other systems corrections to the receivers, which lead to real-time correction with high accuracy. These corrections will be transferred to the receiver antenna by satellite (where coverage is available) and by IP (Internet Protocol) for the rest of world to provide the accurate location on the screen of smartphone or tablet by using specific software. The purpose of this study was to assess the accuracy of Global Navig
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More