MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besides adaptive streaming, while decoder includes displaying of compressed video and the function of network sensing. The videos streaming is tested over two IP networks, Unicast and Multicast. A maps of network performance evaluation and how influences of different videos is achieved through sensors installed at main network nodes.
The aim of this work is to evaluate concentrations of natural and artificial radionuclide in nine different samples of condiments from local markets. The concentrations of 238 U , 232 Th ,40k and 137Cs were measured by using gamma spectroscopy with a high- purity germanium detector. The concentrations of 238 U, 232 Th ,40k and 137Cs were found to be in a range of (21.4 - 91.13), (15.7 - 88.11) , (285.56 – 1100) and (5.1 - 27.5) Bq.kg-1 respectively. These concentrations are not hazardous to public health and the activities are within the allowed levels
A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist
... Show MoreThis study aims to identify the concepts of financial crisis and its reasons of creation , also explain the effects of the accounting disclosure and the International Accounting Standards in current financial crisis, In addition to, indicate the role of accounting in the reform of the financial system from the impact of financial crisis.
The methodology of this study orientied to two main aspects, the first is an identifying approach through exploring the opinion of financial experts, the second aspect is based on an analytical approach to satisfy the requirements of experts to get there opi
... Show MoreA characteristic study of a passively Q-switched diode pumped solid state laser system is presented in this work. For laser a comparison study for the theoretically calculated results with a simulation results using a software which calculates the Q-switched solid state laser parameters was such as energy, peak power and pulse width were performed. There was a good agreement between our theoretical calculations and the simulation values.
<span lang="EN-US">Proper employment of Hybrid Wind/ PV system is often implemented near the load, and it is linked with the grid to study dynamic stability analysis. Generally, instability is because of sudden load demand variant and variant in renewable sources generation. As well as, weather variation creates several factors that affect the operation of the integrated hybrid system. So this paper introduces output result of a PV /wind via power electronic technique; DC chopper; that is linked to Iraqi power system to promote the facilitating achievement of Wind/ PV voltage. Moreover, PSS/E is used to study dynamic power stability for hybrid system which is attached to an effective region of Iraqi Network. The hybrid system
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the
... Show MoreA theoretical calculations of the rate constant of electron transfer (ET) in a dye – semiconductor system with variety solvent are applied on system contains safranineT dye with TiO2 in many solvents like water, 1-propanol, Formamide, Acetonitrile and Ethanol.
A matlap program has been written to evaluate many parameters such that, the solvent reorganization energy, effective free energy, activation free energy, coupling matrix element and the rate constant of electron transfer.
The results of the rate constant of electron transfer calculated theoretically are in a good agreement with experimental and theoretical value
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreRecommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show More