Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro
... Show MoreThe purpose of this study is to explore whether the adoption of Beyond Budgeting (BB) as a management accounting practice (MAP) contributes to developing intellectual capital (IC) and creating value in Iraqi companies. This requires an understanding of the views of the Iraqi managers about the nature of the information provided by this practice, which may be used to determine whether this information is relevant in the management of IC in the context of Iraq. This research aims also to explore the challenges of the adoption of the BB in planning and controlling IC in Iraq. The study adopts a qualitative approach and an interpretive paradigm. It also adopts a semi-structured interview method of collecting data from executive managers
... Show MoreThe paper reports the influence of annealing temperature under vacuum for one hour on the some structural and electrical properties of p-type CdTe thin films were grown at room temperature under high vacuum by using thermal evaporation technique with a mean thickness about 600nm. X-ray diffraction analysis confirms the formation of CdTe cubic phase at all annealing temperature. From investigated the electrical properties of CdTe thin films, the electrical conductivity, the majority carrier concentration, and the Hall mobility were found increase with increasing annealing temperatures.
The paper reports the influence of annealing temperature under vacuum for one hour on the some structural and electrical properties of p-type CdTe thin films were grown at room temperature under high vacuum by using thermal evaporation technique with a mean thickness about 600nm. X-ray diffraction analysis confirms the formation of CdTe cubic phase at all annealing temperature. From investigated the electrical properties of CdTe thin films, the electrical conductivity, the majority carrier concentration, and the Hall mobility were found increase with increasing annealing temperatures.
It is no secret that the prophets speech is of great importance, as the second source of Islamic legislation after the Holy Quran, and as such we must reserve and verify the authenticity of the novel and the narrators seizure, and all the conditions laid down by the scholars.
The subject of our research here concerns part of this verification, which is the unknown, the subject of the unknown hadith is considered a matter of great interest by the modernists because it relates to the validity of the novel and the narrators, and the methods of the modernists varied in terms of the reasons for this weakness, the fool never entertained them by the reckless narrative.
I chose the subject of my research the types of Mahjail and
... Show MoreFood comes after air and water in terms of importance in the survival of human beings, In addition, it is the support and strength of health and support, if lost or destroyed man would die or get sick and become a heavy burden on himself and his society. Food, like other sources of life, is subject to various risks and corruption comes from countless sources. Among these dangers is the result of spontaneousness, lack of knowledge or compulsion due to the interaction of variables beyond the will of the producer and the consumer, such as pollution of water, air and environment and their reflection on food consumed by people. However, we can’t deny that some reasons of corruption are intentional and resulting from a planning in advance in
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More