Most Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noising tool to reduce the effects of both clock skew and queuing delay fluctuations on the decision of congestion type. Since, classical Discrete Wavelet Transform (DWT) is not shift-invariant transform which is a very useful property particularly in signal de-noising problems. Therefore, another transform called Stationary Wavelet Transform (SWT) that possesses shiftinvariant property is suggested and used instead of DWT. The modified technique exhibits a better performance in terms of the time required to correctly detect the state of congestion especially with the existence of clock skew problem. The suggested technique is tested using simulations under different
environments.
The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of whi
... Show MoreIn this paper, we investigate the impact of fear on a food chain mathematical model with prey refuge and harvesting. The prey species reproduces by to the law of logistic growth. The model is adapted from version of the Holling type-II prey-first predator and Lotka-Volterra for first predator-second predator model. The conditions, have been examined that assurance the existence of equilibrium points. Uniqueness and boundedness of the solution of the system have been achieve. The local and global dynamical behaviors are discussed and analyzed. In the end, numerical simulations are confirmed the theoretical results that obtained and to display the effectiveness of varying each parameter
We propose an intraguild predation ecological system consisting of a tri-trophic food web with a fear response for the basal prey and a Lotka–Volterra functional response for predation by both a specialist predator (intraguild prey) and a generalist predator (intraguild predator), which we call the superpredator. We prove the positivity, existence, uniqueness, and boundedness of solutions, determine all equilibrium points, prove global stability, determine local bifurcations, and illustrate our results with numerical simulations. An unexpected outcome of the prey's fear of its specialist predator is the potential eradication of the superpredator.
Mixed convection heat transfer in a vertical concentric annulus packed with a metallic porous media and heated at a constant heat flux is experimentally investigated with water as the working fluid. A series of experiments have been carried out with a Rayleigh number range from Ra=122418.92 to 372579.31 and Reynolds number that based on the particles diameter of Red=14.62, 19.48 and 24.36. Under steady state condition, the measured data were collected and analyzed. Results show that the wall surface temperatures are affected by the imposed heat flux variation and Reynolds number variation. The variation of the local heat transfer coefficient and the mean Nusselt number are presented and analyzed. An empirical
... Show MoreThe objective of this research paper is two-fold. The first is a precise reading of the theoretical underpinnings of each of the strategic approaches: "Market approach" for (M. Porter), and the alternative resource-based approach (R B V), advocates for the idea that the two approaches are complementary. Secondly, we will discuss the possibility of combining the two competitive strategies: cost leadership and differentiation. Finally, we propose a consensual approach that we call "dual domination".
Nearly a century and a half has passed since Sarah Orne Jewett published her much anthologized short story “A White Heron” (1886), but commentators on the tale missed one of the most important points in the text. It is the story’s similarity to the traditional Euro-centric fairy tale of “Little Red Riding Hood”. As an author, writing at the end of the ninetieth century, a time that witnessed the demise of the Romantic movement in America and the beginning of the age of Realism, Jewett did not romanticize her characters, despite the idyllic landscape in which “A White Heron” is set. Her story can be analyzed as a text that aims at disseminating ecological awareness among her young readers. This study focuses on Jewett
... Show MoreThe present work deals with five species of parasitic Hymenoptera belonging to Pteromalidae, Eupelmidae and Eurytornidae which have been reared from brachid beetles. A new species, Eurytoma irakensis is described and the species, Bruchocida orientalis Crawford is recorded for the first time from Iraq.
Flow-production systems whose pieces are connected in a row may not have maintenance scheduling procedures fixed because problems occur at different times (electricity plants, cement plants, water desalination plants). Contemporary software and artificial intelligence (AI) technologies are used to fulfill the research objectives by developing a predictive maintenance program. The data of the fifth thermal unit of the power station for the electricity of Al Dora/Baghdad are used in this study. Three stages of research were conducted. First, missing data without temporal sequences were processed. The data were filled using time series hour after hour and the times were filled as system working hours, making the volume of the data relativel
... Show MoreThis paper presents a study of the application of gas lift (GL) to improve oil production in a Middle East field. The field has been experiencing a rapid decline in production due to a drop in reservoir pressure. GL is a widely used artificial lift technique that can be used to increase oil production by reducing the hydrostatic pressure in the wellbore. The study used a full field model to simulate the effects of GL on production. The model was run under different production scenarios, including different water cut and reservoir pressure values. The results showed that GL can significantly increase oil production under all scenarios. The study also found that most wells in the field will soon be closed due to high water cuts. Howev
... Show MoreBabesiosis is a tick-borne disease caused by Babesia microti. We present a case of false positive HIV in the setting of confirmed babesiosis infection. An understanding that patients with babesiosis can have a false positive HIV test result is important in management decisions.