MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besides adaptive streaming, while decoder includes displaying of compressed video and the function of network sensing. The videos streaming is tested over two IP networks, Unicast and Multicast. A maps of network performance evaluation and how influences of different videos is achieved through sensors installed at main network nodes.
The research aims to shed light on the impact of the application of the electronic services system on electronic banking activities in a sample of Iraqi banks, as investment in technology is the most important factor for the success and future growth of administrative companies in general, and banking in particular, as global economic developments in the field of Technology has led the majority of banking sectors in the world to undergo deep reforms and radical changes in the entity of their systems and mechanisms to confront competition and keep pace with economic changes, as the concept of banking services and its diversity changed with it, especially since persistence in the traditional approach no longer gi
... Show MoreNowadays, the mobile communication networks have become a consistent part of our everyday life by transforming huge amount of data through communicating devices, that leads to new challenges. According to the Cisco Networking Index, more than 29.3 billion networked devices will be connected to the network during the year 2023. It is obvious that the existing infrastructures in current networks will not be able to support all the generated data due to the bandwidth limits, processing and transmission overhead. To cope with these issues, future mobile communication networks must achieve high requirements to reduce the amount of transferred data, decrease latency and computation costs. One of the essential challenging tasks in this subject
... Show MoreThe services provided by the municipal institutions of the basic things needed by the man in his daily life and the evolution of cities basically depends on these services and therefore has paid most of the world's attention to this vital facility and give him the biggest concern for the welfare of the citizens, as is the research problem that there is no program scrutiny to evaluate the performance of municipal institutions contribute to measuring the efficiency and effectiveness of the services provided and was based on research on the premise that the preparation of the existence of audit program to evaluate the performance of municipal institutions contribute to measuring the efficiency and effectiveness of services provided has reac
... Show MoreInternet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More