<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task
... Show MoreThe aim of this research is to find out about the methods used by the teachers of the subjects (choir, voice training, singing groups) used to warm up in voice training. In the Department of Music of the Faculty of Fine Arts University of Baghdad. The limits of this research were for the academic year (2017-2018). Explanation in the theoretical framework of warm-up types The first part of the body warms the body in terms of relaxation, body moderation, head rotation, tongue exercises, mouth opening, facial mask movements, yawning.The second course will warm up the sound exercises warm up the sound through different ladders (diatonic and chromate), and ladder accordions.And the third topic warm up the impris
... Show MoreIn this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this
... Show MoreStudies and scientific research conducted in the field of communication have shown that broadcasting has a clear impact on the ideas, attitudes and behavior of the masses if it is better used in making the media message studied.
The role of this means is not only to present opinions and ideas, but also to influence trends by supporting or changing them. This is of course a matter for the nature of the content in terms of its formulation and the way it is prepared and presented. The power and appeal of a radio message is not complete by simply creating content without creating a distinctive design; and to what extent this content depends on the logic and psychology of persuasion.
The conviction of the cont
... Show MoreArray antennas have an interesting role in the radio astronomy field. The array antennas allow astronomers to obtain high-resolution signals with high sensitivity to weak signals. This paper estimates the meteors' positions entering the Earth's atmosphere and develops a simulation for array antenna radar to analyze the meteor's echoes. The GNU radio software was used to process the echoes, which is a free open-source software development toolkit that provides signal processing blocks to implement in radio projects. Then, the simulation determines the azimuth and elevation of the meteors. An improved Multiple Signal Classification (MUSIC) algorithm has been suggested to analyze these echoes. The detected power of each meteor echo has
... Show MoreThe need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show More