Preferred Language
Articles
/
joe-731
Link Failure Recovery for a Large-Scale Video Surveillance System using a Software-Defined Network
...Show More Authors

The software-defined network (SDN) is a new technology that separates the control plane from data plane for the network devices. One of the most significant issues in the video surveillance system is the link failure. When the path failure occurs, the monitoring center cannot receive the video from the cameras. In this paper, two methods are proposed to solve this problem.  The first method uses the Dijkstra algorithm to re-find the path at the source node switch. The second method uses the Dijkstra algorithm to re-find the path at the ingress node switch (or failed link). Based on simulation results, it is concluded that the second method consumes less time (lower transmission delay) than the first method. The delay consumed by the second method is half the delay in the first method. Also, the packet loss rate for second method is 14%, while 16% in the first method. The jitter for second method is almost similar to the jitter without link fail. Therefore, the second method led to select the path with small losses without impact on video quality. Finally, the results of two methods  are compared in terms of end to end delay, packet loss rate, and jitter.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
International Journal Of Transportation Engineering And Traffic System, Ijtets
Comparative Modeling of Pavement Surface Texture Variables Using ANN and SPSS Software
...Show More Authors

The health of Roadway pavement surface is considered as one of the major issues for safe driving. Pavement surface condition is usually referred to micro and macro textures which enhances the friction between the pavement surface and vehicular tires, while it provides a proper drainage for heavy rainfall water. Measurement of the surface texture is not yet standardized, and many different techniques are implemented by various road agencies around the world based on the availability of equipment’s, skilled technicians’ and funds. An attempt has been made in this investigation to model the surface macro texture measured from sand patch method (SPM), and the surface micro texture measured from out flow time (OFT) and British pendul

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Small Horizontal Wind Turbine Design and Aerodynamic Analysis Using Q-Blade Software
...Show More Authors

Wind energy is one of the most common and natural resources that play a huge role in energy sector, and due to the increasing demand to improve the efficiency of wind turbines and the development of the energy field, improvements have been made to design a suitable wind turbine and obtain the most energy efficiency possible from wind. In this paper, a horizontal wind turbine blade operating under low wind speed was designed using the (BEM) theory, where the design of the turbine rotor blade is a difficult task due to the calculations involved in the design process. To understand the behavior of the turbine blade, the QBlade program was used to design and simulate the turbine rotor blade during working conditions. The design variables suc

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Journal Of The College Of Education For Women
The Exploratory and Confirmatory Factorial Structure of Test-Wiseness Scale: A Field Study on a Sample of Students in Hama University
...Show More Authors

The current research aims to recognize the exploratory and confirmatory factorial structure of the test-wiseness scale on a sample of Hama University students, using the descriptive method. Thus, the sample consists of (472) male and female students from the faculties of the University of Hama. Besides, Abu Hashem’s 50 item test-wiseness scale (2008) has been used. The validity and reliability of the items of the scale have also been verified, and six items have been deleted accordingly. The results of the exploratory factor analysis of the first degree have shown the presence of the following five acceptable factors: (exam preparation, test time management, question paper handling, answer sheet handling, and revision).  Moreover,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Prediction of Monthly Fluoride Content in Tigris River using SARIMA Model in R Software
...Show More Authors

The need to create the optimal water quality management process has motivated researchers to pursue prediction modeling development. One of the widely important forecasting models is the sessional autoregressive integrated moving average (SARIMA) model. In the present study, a SARIMA model was developed in R software to fit a time series data of monthly fluoride content collected from six stations on Tigris River for the period from 2004 to 2014. The adequate SARIMA model that has the least Akaike's information criterion (AIC) and mean squared error (MSE) was found to be SARIMA (2,0,0) (0,1,1). The model parameters were identified and diagnosed to derive the forecasting equations at each selected location. The correlation coefficien

... Show More
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Prediction of Monthly Fluoride Content in Tigris River using SARIMA Model in R Software
...Show More Authors

The need to create the optimal water quality management process has motivated researchers to pursue prediction modeling development. One of the widely important forecasting models is the sessional autoregressive integrated moving average (SARIMA) model. In the present study, a SARIMA model was developed in R software to fit a time series data of monthly fluoride content collected from six stations on Tigris River for the period from 2004 to 2014. The adequate SARIMA model that has the least Akaike's information criterion (AIC) and mean squared error (MSE) was found to be SARIMA (2, 0, 0) (0,1,1). The model parameters were identified and diagnosed to derive the forecasting equations at each selected location. The correlat

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Data Classification using Quantum Neural Network
...Show More Authors

In this paper, integrated quantum neural network (QNN), which is a class of feedforward

neural networks (FFNN’s), is performed through emerging quantum computing (QC) with artificial neural network(ANN) classifier. It is used in data classification technique, and here iris flower data is used as a classification signals. For this purpose independent component analysis (ICA) is used as a feature extraction technique after normalization of these signals, the architecture of (QNN’s) has inherently built in fuzzy, hidden units of these networks (QNN’s) to develop quantized representations of sample information provided by the training data set in various graded levels of certainty. Experimental results presented here show that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 24 2014
Journal Name
Journal Of Religion And Health
Cross-Cultural Validation and Psychometric Properties of the Arabic Brief Religious Coping Scale (A-BRCS)
...Show More Authors

View Publication
Scopus (22)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Building and codifying a scale of the level of tactical performance of advanced volleyball players
...Show More Authors

The research objectives, to build a measure of the level of tactical performance of volleyball players applying for the Iraqi Premier League for the 2018-2019 season. The nature of the research problem, then the researchers determined the research sample in the deliberate manner of the players of the Iraqi clubs for the Premier League (B, A). The researchers adopted the entire community as a sample for the research, and the number (156) players distributed over (13) clubs and divided the sample into (12)players an exploratory experiment player representing (the police club) and (100) player representing the construction sample and after a maximum period of two months has passed since applying the scale to the construction sample the researc

... Show More
Preview PDF
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.