Preferred Language
Articles
/
nReoTJIBVTCNdQwCGqrG
Mpeg-Dash System via HTTP2 Protocol with HEVC Encoder for Video Streaming Services
...Show More Authors

MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besides adaptive streaming, while decoder includes displaying of compressed video and the function of network sensing. The videos streaming is tested over two IP networks, Unicast and Multicast. A maps of network performance evaluation and how influences of different videos is achieved through sensors installed at main network nodes.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Design and evalution of a solar PV system
...Show More Authors

PV connected systems are worldwide installed because it allows consumer to reduce energy consumption from the electricity grid. This paper presents the results obtained from monitoring a 1.1 kWp. The system was monitored for nine months and all the electricity generated was fed to the fifth floor for physics and renewable energy building   220 V, 50 Hz. Monthly, and daily performance parameters of the PV system are evaluated which include: average generated of system Ah per day, average system efficiency, solar irradiation around these months. The average generated kWh per day was 8 kWh/day, the average solar irradiation per day was 5.6 kWh/m2/day, the average inverter efficiency was 95%, the average modules efficien

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Characterization of Magnetized-Plasma System Induced by Laser
...Show More Authors

  This study investigated the effect of applying an external magnetic field on the characteristics of laser-induced plasma, such as its parameters plasma, magnetization properties, emission line intensities, and plasma coefficients, for plasma induced from zinc oxide: aluminum composite (ZO:AL) at an atomic ratio of 0.3 %. Plasma properties include magnetization and emission line intensities. The excitation was done by a pulsed laser of Nd:YAG with 400 mJ energy at atmospheric pressure. Both the electron temperature and number density were determined with the help of the Stark effect principle and the Boltzmann-Plot method. There was a rise in the amount of (ne) and (Te) that was produced

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Analysis and Development of Customer Billing Telephony System
...Show More Authors

The telecommunications industry has gone through series of development efforts to provide quality services to their consumers. Generally, telecommunication industry provides two main services such as telephony and internet which involved customer registration, billing and payment. However, the challenge confronting telecommunications industry is to meet the customer satisfaction in the billing system such as accuracy, easy to understand and unambiguous billing issue. In order to develop Customer Billing Telephony System,a user experience study is conducted to gather the user requirements. Hence, the CBTS was developed that takes into consideration user’s value experience that provides a support for managing and monitoring billing proce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
COVID-19 Diagnosis System using SimpNet Deep Model
...Show More Authors

After the outbreak of COVID-19, immediately it converted from epidemic to pandemic. Radiologic images of CT and X-ray have been widely used to detect COVID-19 disease through observing infrahilar opacity in the lungs. Deep learning has gained popularity in diagnosing many health diseases including COVID-19 and its rapid spreading necessitates the adoption of deep learning in identifying COVID-19 cases. In this study, a deep learning model, based on some principles has been proposed for automatic detection of COVID-19 from X-ray images. The SimpNet architecture has been adopted in our study and trained with X-ray images. The model was evaluated on both binary (COVID-19 and No-findings) classification and multi-class (COVID-19, No-findings

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Thu Mar 04 2021
Journal Name
Journal Of Coastal Conservation
Solar system planetary alignment triggers tides and earthquakes
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Global virtual teams management system: project manager guide
...Show More Authors

Global virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Tue Mar 24 2009
Journal Name
Proceeding Of 3d Scientific Conference Of The College Of Science, University Of Baghdad 24 To 26 March 2009
Bacterial DNA induces inflammations in murine renal system
...Show More Authors

Abstract Since unmethylated CpG motifs are more common in DNA from bacteria than vertebrates, and the unmethylated CpG motif has recently been reported to have stimulatory effects on lymphocytes, we speculated that bacterial DNA may induce inflammation in the urinary tract. To determine the role of bacterial DNA in lower UTI, we intraurethrally injected prokaryotic DNA (extracted from E. coli) in white mice and performed histopathological study for the kidneys and urinary bladders, 24 h after the exposure. The results showed infiltration of inflammatory cells, shrinkage of glomerulus and increase the capsular space, as well as edema formation in kidney tissues. Moreover, urinary bladder sections showed infiltration of inflammatory cells.

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Public budget System repair Targets Prepared Public Budget
...Show More Authors

Require senior management of the state when developing the strategy the general budget to the clarity of the reasons that are based upon the ministries in the preparation of estimates of expenditure for the next year to justify the spending, and in the absence of targets, the ministry or government unit would not be in front, but be guided by the size of expenditure for the last year in addition to the percentage of represented an increase of appropriations required for the next year in light of the fiscal policy of the state, so the requested increase in appropriations to meet the desired increase in some of its activities and to meet the increase in salaries and prices. So must be available to the Ministry of criteria that coul

... Show More
View Publication Preview PDF
Crossref