Preferred Language
Articles
/
tBZjSIcBVTCNdQwCXkGG
Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks
...Show More Authors

Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were throughput, end-to-end delay, and packet loss ratio. They compared their performance to learn in which traffic flow/service each of these protocols functions better than the others. The throughput of SCTP and TFRC is better than UDP. DCCP is superior to SCTP and TFRC in terms of end-to-end delay. SCTP is suitable for Internet applications that require high bandwidth.

Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
6G Wireless Communications Networks: A Comprehensive Survey
...Show More Authors

View Publication
Scopus (328)
Crossref (328)
Scopus Clarivate Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Influence Activation Function in Approximate Periodic Functions Using Neural Networks
...Show More Authors

The aim of this paper is to design fast neural networks to approximate periodic functions, that is, design a fully connected networks contains links between all nodes in adjacent layers which can speed up the approximation times, reduce approximation failures, and increase possibility of obtaining the globally optimal approximation. We training suggested network by Levenberg-Marquardt training algorithm then speeding suggested networks by choosing most activation function (transfer function) which having a very fast convergence rate for reasonable size networks.             In all algorithms, the gradient of the performance function (energy function) is used to determine how to

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Science And Research (ij
Simulation of Chlorine Decay in Al-Gukook WaterDistribution Networks Using EPANET
...Show More Authors

The approach of the research is to simulate residual chlorine decay through potable water distribution networks of Gukookcity. EPANET software was used for estimating and predicting chlorine concentration at different water network points . Data requiredas program inputs (pipe properties) were taken from the Baghdad Municipality, factors that affect residual chlorine concentrationincluding (pH ,Temperature, pressure ,flow rate) were measured .Twenty five samples were tested from November 2016 to July 2017.The residual chlorine values varied between ( 0.2-2mg/L) , and pH values varied between (7.6 -8.2) and the pressure was very weak inthis region. Statistical analyses were used to evaluated errors. The calculated concentrations by the calib

... Show More
Publication Date
Fri Apr 01 2016
Journal Name
Pediatric Dental Journal
Retrospective analysis of 1286 oral and maxillofacial biopsied lesions of Iraqi children over a 30 years period
...Show More Authors

Objectives To determine the prevalence of oral lesions by age and gender among the pediatric population in Iraq. Materials and methods A review of the archives of the oral pathology department of Baghdad University from, 1970 Materials and Methods: A review of the archives of the oral pathology department of Baghdad University from 1970 to 2013 for all biopsies from children aged 0–15 years old. Results A total of 1286 child specimens represented 11.98% of all biopsied lesions. The pyogenic granuloma was the most frequent lesion in children, and the periapical cyst was the most frequent lesion from an odontogenic origin. The incidence of malignant lesions was higher in the 0–3 age group than other groups. Conclusions The majority of les

... Show More
View Publication
Scopus (15)
Crossref (11)
Scopus Crossref
Publication Date
Wed Jan 08 2020
Journal Name
Environment, Development And Sustainability
Groundwater availability and water demand sustainability over the upper mega aquifers of Arabian Peninsula and west region of Iraq
...Show More Authors

View Publication
Crossref (80)
Crossref
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
SPEECH RECOGNITION OF ARABIC WORDS USING ARTIFICIAL NEURAL NETWORKS
...Show More Authors

The speech recognition system has been widely used by many researchers using different
methods to fulfill a fast and accurate system. Speech signal recognition is a typical
classification problem, which generally includes two main parts: feature extraction and
classification. In this paper, a new approach to achieve speech recognition task is proposed by
using transformation techniques for feature extraction methods; namely, slantlet transform
(SLT), discrete wavelet transforms (DWT) type Daubechies Db1 and Db4. Furthermore, a
modified artificial neural network (ANN) with dynamic time warping (DTW) algorithm is
developed to train a speech recognition system to be used for classification and recognition
purposes. T

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Corrosion Inhibition of Carbon Steel under Two Phase Flow (Water-Petroleum) Simulated by Turbulently Agitated System
...Show More Authors

The corrosion of carbon steel in single phase (water with 0.1N NaCl ) and two immiscible phases (kerosene-water) using turbulently agitated system is investigated. The experiments are carried out for Reynolds number (Re) range of 38000 to 95000 corresponding  to rotational velocities from 600 to 1400 rpm using circular disk turbine agitator at 40 0C. In two-phase system test runs are carried out in aqueous phase (water) concentrations of 1 % vol., 5 % vol., 8% vol., and 16% vol. mixed with kerosene at various Re. The effect of Reynolds number (Re), percent of dispersed phase, dispersed drops diameter, and number of drops per unit volume on the corrosion rate is investigated and discussed. Test runs are carried out using two types of

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technologyā€¸
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Complete Arcs in Projective Plane PG (2,11) Over Galois field
...Show More Authors

    In this work, we construct complete (K, n)-arcs in the projective plane over Galois field GF (11), where 12 2 ≤ ≤ n  ,by using geometrical method (using the union of some maximum(k,2)- Arcs , we found (12,2)-arc, (19,3)-arc , (29,4)-arc, (38,5)-arc , (47,6)-arc, (58,7)-arc, (68,6)-arc, (81,9)-arc, (96,10)-arc, (109,11)-arc, (133,12)-arc, all of them are complete arc in PG(2, 11) over GF(11).  

View Publication Preview PDF