Preferred Language
Articles
/
nReoTJIBVTCNdQwCGqrG
Mpeg-Dash System via HTTP2 Protocol with HEVC Encoder for Video Streaming Services
...Show More Authors

MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besides adaptive streaming, while decoder includes displaying of compressed video and the function of network sensing. The videos streaming is tested over two IP networks, Unicast and Multicast. A maps of network performance evaluation and how influences of different videos is achieved through sensors installed at main network nodes.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 11 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Dynamic Background Subtraction in Video Surveillance Using Color-Histogram and Fuzzy C-Means Algorithm with Cosine Similarity
...Show More Authors

The background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Al-kindy College Medical Journal
Clients' Satisfaction with Immunization Services at Primary Health Care Centers in Baghdad, Al-Karkh
...Show More Authors

Background: Client satisfaction with the immunization service is used to evaluate the quality of the admitted service and at the same time it affects the goodness of the health care outcome.

Objectives: This study assessed the satisfaction with immunization services offered to children and factors affecting this satisfaction.

Methods: Exit interviews for clients were conducted in Baghdad, Al-Karkh in a representative sample of primary health care centers to assess clients’ satisfaction with immunization services. Clients are companions of children encountered at study settings.

Results: Among the 253 respondent clients, 183 (72.3%) reflected satisfaction with the immunization

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Aro-the Scientific Journal Of Koya University
The Most Common Characteristics of Fragile Video Watermarking
...Show More Authors

The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Microalgae Chlorella Vulgaris Harvesting Via Co-Pelletization with Filamentous Fungus
...Show More Authors

The objective of this study was to progress another method for coagulation/flocculation of the microalga Chlorella vulgaris via pellet-forming of the fungal species Aspergillus niger which was isolated from municipal wastewater mud and the facultative heterotrophic microalga "C.vulgaris was used. The main factors studies were spore inoculums, organic carbon concentration in medium as well as pH variation which had considerably positive effects on microalgae/fungi co-pelletization formation. The process parameters are an inoculum1×104 spores/ML, 15 g/l sucrose as carbon source and pH ranged from 5 - 7.0 were found optimal for efficient microalgae/fungi co-pelletization formation. For autotrophic growth, when pH of culture broth was adjusted

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Engineering
Modified W-LEACH Protocol in Wireless Sensor Network
...Show More Authors

In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.

  

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Fri Sep 20 2019
Journal Name
Journal Of The College Of Education For Women
Educational Services Efficiency in Jalawla
...Show More Authors

The city of Jalawla is the administrative center of Jalawla district. It is located in the district of Khanaqin with a population of 62117 inhabitants in 2018. The city of Jalawla suffers from an imbalance in the geographical distribution of educational services among the residential neighborhoods. There are only two schools in the camp district According to the city's population, if the city of Jalawla needs eleven kindergartens and needs one primary school, eight middle schools, two preparatory schools, three secondary schools and two vocational schools. Despite the low share of the teacher or teacher for the number of students (25) students Enrollment in schools for the school of high school athletes and school students. Which determi

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 20 2007
Journal Name
Journal Of Planner And Development
Residential Services Criteria's in Iraq
...Show More Authors

Many studies and researches represented the importance of the planning and designing criteria's. Planning and Designing issue influence by three factors, firstly: The Present situation of life is always exchanging and developing. Secondly: Design work represents views of problem that never appear at the beginning of the work but only by plan implementation which need to in some cases to modifying the specify aims and criteria's. Thirdly: Never establish criteria's and aims that can be used as a reference before starting design and planning process. This research will study present situation of the services for residential areas criteria's and planning legitimate in some designed cities in Iraq with different levels (neighborhood,

... Show More
View Publication Preview PDF