Preferred Language
Articles
/
joe-731
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link). Based on simulation results, it is concluded that the second method consumes less time (lower transmission delay) than the first method. The delay consumed by the second method is half the delay in the first method. Also, the packet loss rate for second method is 14%, while 16% in the first method. The jitter for second method is almost similar to the jitter without link fail. Therefore, the second method led to select the path with small losses without impact on video quality. Finally, the results of two methods  are compared in terms of end to end delay, packet loss rate, and jitter.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 05 2011
Journal Name
International Journal Of Chemical Reactor Engineering
Mass Transport Properties of a Flow-Through Electrolytic Reactor Using Zinc Reduction System
...Show More Authors

An electrolytic process for the removal of Zn(II) from aqueous solution using a parallel amalgamated copper screens cathode operated in the flow through mode is proposed. The current-potential curves recorded at a rotating amalgamated copper disc electrode were used to determine diffusion coefficient of Zn(II). The performance of electrolytic reactor was investigated by using different flow rates at initial zinc ion concentration(48 mg/L). Taking into account the residential Zn(II) concentration, the best results were obtained for cathode potential of (-1.35 V vs. SCE) at flow rate (320 L/h). Zinc ion concentration was found to decrease from 48 mg/L to 1 mg/L during 120 min. of electrolysis. The experimental data are well correlate

... Show More
View Publication
Crossref
Publication Date
Sun Nov 19 2023
Journal Name
Aip Conference Proceedings
Designing a database for a three dimensional model using geomatics techniques
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Computer Science Trends And Technology
Secure Video Data Deduplication in the Cloud Storage Using Compressive Sensing
...Show More Authors

Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
A Mathematical Model of a Thermally Activated Roof (TAR) Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature
...Show More Authors

This paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
International Journal On Technical And Physical Problems Of Engineering
A Multiple System Biometric System Based on ECG Data
...Show More Authors

A Multiple System Biometric System Based on ECG Data

Scopus
Publication Date
Wed Apr 26 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Video Copyright Protection
...Show More Authors

Illegal distribution of digital data is a common danger in the film industry, especially with the rapid spread of the Internet, where it is now possible to easily distribute pirated copies of digital video on a global scale. The Watermarking system inserts invisible signs to the video content without changing the content itself. The aim of this paper is to build an invisible video watermarking system with high imperceptibility. Firstly, the watermark is confused by using the Arnold transform and then dividing into equal, non-overlapping blocks. Each block is then embedded in a specific frame using the Discrete Wavelet Transform (DWT), where the HL band is used for this purpose. Regarding the method of selecting the host frames, the

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Determination of Corrosion Parameters for a Cathodic Reaction Complicated by IR Drop Effect in a Flow System
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Jan 28 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of accounting system in the recovery from the impact of financial crisis
...Show More Authors

          This study aims to identify the concepts of financial crisis and its reasons of creation , also explain the effects of the accounting disclosure and the International Accounting Standards in current financial crisis, In addition to,  indicate the role of accounting in the reform of the financial system from the impact of financial crisis.      

       The  methodology of this study orientied to two main aspects, the first is an identifying approach through exploring the opinion of financial experts, the second aspect is based on an analytical approach to satisfy the requirements  of experts to get there opi

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Ieee Transactions On Network Science And Engineering
A Resource Allocation Mechanism for Cloud Radio Access Network Based on Cell Differentiation and Integration Concept
...Show More Authors

View Publication
Crossref (15)
Crossref