Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were throughput, end-to-end delay, and packet loss ratio. They compared their performance to learn in which traffic flow/service each of these protocols functions better than the others. The throughput of SCTP and TFRC is better than UDP. DCCP is superior to SCTP and TFRC in terms of end-to-end delay. SCTP is suitable for Internet applications that require high bandwidth.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreABSTRACT
Metal (II) complexes of Co, Ni, Cu and Zn with cefdinir C14H13N5O5S2 derivative (L) were synthesized and identification by elemental analysis CHNS Uv-Vis, FTIR, TGA, metal analysis AA, magnetic susceptibility and conduct metric measurement. by analysis the ligand behaves as a bidentate. For the cobalt complex, Tetrahedral geometry shape was suggested, while other complexes that have nickel, copper and zinc ions were proposed as octahedral geometry shape. The experimental method was studied for prevention of corrosion carbon steel in 3.5% NaCl by using a novel Cefdinir derivations drugs. The results showed that metal complex was a strong corro
... Show MoreThe problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu
This qualitative study was conducted on eight types of commercial baking yeast which available in local markets to estimate their fermentation activity as affecting the Bread industry and the impact of the salt added to DoughLeavening, The results showed a great variation in the fermentation capacity of yeast samples (their role in swelling the dough), most notably the sample value Y3 and least sample Y7 and reached 80% and 20% respectively, and the value of Leavening by using the two types of yeast with addition of three levels of salt (0 , 1 and 2%) have 20.0 , 19.7 and 15.7 of the sample Y3, compared with 10.5 , 10.3 and 8.8 of the sample Y7 for each of the levels of salt respectively, reflect
... Show MoreThe current study aims to investigate the effect of the interaction between the use of the improve strategy in teaching mathematics and the level of academic achievement on the acquisition of algebraic concepts and habits of mind among tenth-grade students in Oman. The study adopted the experimental method, based on a quasi-experimental design with two groups: experimental and control groups and pre-post-measurement. The study sample consisted of (28) 10th-grade students as an experimental group and 26 of 10th-grade students as a control group in Al-Tufail bin Amr School in South Al Batinah. The differences in the pretest and posttest gains were analyzed using mean, standard deviation, ANCOVA, t-test, effect size (eta-square), and two-wa
... Show MoreThe study aims to investigate the effect of the Six Thinking Hats Strategy on the achievement of essay writing skills among third-year students in Arabic Language and Literature who are Persian speakers enrolled in the course of Essay Writing (III) at Shiraz University for the academic year 2019-2020. The sample of the study consisted of (15) male and female students who were taught according to the pre-posttest, using the quasi-experimental approach. After applying the statistical analysis on the scores of the post-test, the results showed that there are statistically significant differences in the average of students' achievement in the skills of essay writing in terms of using the Six Thinking Hats Strategy. The results also proved th
... Show MoreIn this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database
Many people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I d
... Show MoreStress is an inevitable part of life. Stress occurs when stressful events of self, environmental, or social origin affect the individual's resilience and threaten to collapse his psychological and physical systems. The stress represents difficulties and obstacles that may exceed the individual's ability to bear them and deal with them, which causes him stress and causes negative effects on his psychological and physical health. Therefore, the current research aimed to identify the negative effects of psychological stress on the psychological and physical health of the individual through the literature that dealt with this topic. It was among the results of the research that one of the negative effects of stresses on mental health is the
... Show More