A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video streaming, it may also cause a video bitrate oscillation. So the video buffer structure is adjusted by adding two thresholds as operating points for overflow and underflow states to filter the impact of throughput fluctuation on video buffer occupancy level. Then a bandwidth prediction algorithm is proposed for enhancing the performance of video bitrate adaptation. This algorithm's work depends on the current video buffer level, video bitrate of the previous segment, and iterative throughput measurements to predict the best video bitrate for the next segment. Simulation results show that reserving a bandwidth margin is better in adapting the video bitrate under bandwidth variation and then reducing the risk of video playback freezing. Simulation results proved that the playback freezing happens two times: firstly, when there is no bandwidth margin used and secondly, when the bandwidth margin is high while smooth video bitrate is obtained with moderate value. The proposed scheme is compared with other two schemes such as smoothed throughput rate (STR) and Buffer Based Rate (BBR) in terms of prediction error, QoE preferences, buffer size, and startup delay time, then the proposed scheme outperforms these schemes in attaining smooth video bitrates and continuous video playback.
Cloud computing describes computer services provided through the internet and includes a wide range of virtualization resources. Because cloud computing is made up of a sizable number of heterogeneous autonomous systems with an adaptable computational architecture, it has been widely adopted by many businesses. The scheduling and management of resource utilization, however, have become more difficult as a result of cloud computing. Task scheduling is crucial, and this procedure must schedule tasks on the virtual machine while using the least amount of time possible. Utilizing an effective scheduling strategy enhances and expedites cloud computing services. Optimization techniques are used to resolve cloud scheduling problems.
... Show MoreIn this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreThe autocorrelation function calculations have been carried out on photon-limited computer-simulated images of binary stars that recorded through kolmogorov atmospheric turbulence. The effect of the parameters of photon limited binary star on the variation of signal to noise, signal to background ratios, number of images that processed and the magnitude of binary stars are studied and mathematic equations are given to investigate this effect. The result indicates that signal to background ratio of photon limited images of a binary star is independent of the total number of recorded photons.
In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThis is a survey study that presents recent researches concerning factional controllers. It presents several types of fractional order controllers, which are extensions to their integer order counterparts. The fractional order PID controller has a dominant importance, so thirty-one paper are presented for this controller. The remaining types of controllers are presented according to the number of papers that handle them; they are fractional order sliding mode controller (nine papers), fuzzy fractional order sliding mode controller (five papers), fractional order lag-lead compensator (three papers), fractional order state feedback controller (three papers), fractional order fuzzy logic controller (three papers). Finally,
... Show MoreThis paper aims to shed light on adaptive reuse in traditional architecture (TA) in Erbil, Iraq.
An inductive approach and qualitative method were used in this study. The inductive research approach was used because there was no clear image of adaptive reuse in traditional cafés (TCs) in Erbil. Besides, there are no studies of TCs in Erbil particularly. Thus, there is a lack of knowledge about what adaptations took place in TCs in Erbil. The qualitative method extracted themes and issues from case studies of four TCs in Erbil citadel'
In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
This paper proposed several approaches for estimating the optical turbulence of the Earth’s atmosphere and their effect on solar images’ resolution using ground-based telescopes based on von Kárman, Kolmogorov, and modified von Kárman PSDs models. The results showed a strong correlation coefficient for the modified von Kármán model of atmospheric representation. As can be seen in the case where solar adaptive optics have been properly designed, they typically decrease aberration considerably and provide greatly improved imagery.