Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were throughput, end-to-end delay, and packet loss ratio. They compared their performance to learn in which traffic flow/service each of these protocols functions better than the others. The throughput of SCTP and TFRC is better than UDP. DCCP is superior to SCTP and TFRC in terms of end-to-end delay. SCTP is suitable for Internet applications that require high bandwidth.
Purpose :This study seeks to provide the point of view stands on the marketing performance of the banks in the context of Dynamic Equilibrium of marketing. It aims to develop a prototype of measuring marketing performance under the umbrella of marketing dynamic prototype, embodied of the strategic alliance and competition, and the laws and legislation, and to explore any of the dimensions more effective in achieving performance. This study aims to discusses the importance of the Dynamic Equilibrium of marketing and it role in achieving the marketing performance <
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreCoupling reaction of m-and p- amino acetop henone and p-amino benzoic acid with (LHistidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass sp ectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M (L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the com
... Show MoreCoupling reaction of m-and p- amino acetophenone and p-amino benzoic acid with (L- Histidine) gave the new bidentate azo ligands (L1, L2 and L3). The prepared ligands were identified by FT-IR, UV-Vis, 1HNMR and GC- mass spectroscopic technique. Treatment of the prepared ligands with the following metal ions (CoII, NiII, CuII, ZnII, CdII and HgII) in aqueous ethanol with a 1:2 M:L ratio and at optimum pH, yielded a series of neutral complexes of the general formula [M(L)2 Cl2]. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis and 1HNMR spectroscopic methods as well as magnetic susceptibility and conductivity measurements. Chloride ion content was also evaluated by (Mohr method). The nature of the c
... Show MoreThe research aims to: build and record a measure of cognitive participation among second-year female students at the College of Physical Education and Sports Sciences, University of Baghdad. The researchers used the descriptive approach in the survey style for the research sample. The sample was selected from female students and divided into: (10) female students for the survey sample, and (80) female students for the construction and codification sample. The data were statistically analyzed by the researchers using SPSS, the T-test for independent and correlated samples, Pearson's simple correlation coefficient, Cronbach's alpha, Chi-square, and Spearman-Brown. They were recruited for the samples. The study concluded that constr
... Show MoreAbstract
were determine the problem of current research to answer the question on the consciousness of the Ministry of Agriculture to adopt Staffing strategy and identify the shortcomings as the independent variable, represented by the three dimensions (recruitment , selection, placement) and its impact on high performance, as dependent variable is described in four dimensions (leadership, strategy, structure and processes, culture), in this research were Used analytical descriptive style . This research aims to identify the correlation and impact of Staffing strategy at high-performance in Ministry of Agriculture , To clarify the relationship between
... Show MoreAbstract
The study aims to clarify the impact of the adoption of the International Financial Reporting Standard (IFRS16) on lease contracts in the General Iraqi Insurance Company on the financial statements, and thus the impact on financial ratios and indicators, Since the financial reporting standard considers lease contracts as an asset called the right to use the asset and is offset by a liability, this changes the way the financial statements are presented, with an addition to both the asset and liability sides. In order to show the extent to which the adoption of the standard reflects on the financial performance
... Show MoreThe aim of the study was to find out the correlations and impact between the variable of ethical leadership behavior and university performance at Sumer University. Use the descriptive analytical method by adopting the questionnaire tool to collect data. The questionnaire was distributed electronically to 113 teachers at Sumer University and the response was from 105 teachers. The research results showed that there is a correlation and effect relationship between the search variables. In addition, the responding university does not have ethically defined standards in terms of performance of the work of the cadres working there. Finally, the research presented a set of recommendations aimed at tackling problems in the ethical lead
... Show MoreThe aim of this study is to highlight the relationship between competitive intelligence and Entrepreneurial Performance by centralizing the strategic vigilance of a sample of civil faculties in Baghdad. The sample of the study was targeted at 10 Iraqi civil colleges, which consisted of (133) members of the faculty council of the faculties, the search data was collected using the questionnaire form as the main research tool. The results showed that the correlation and influence of competitive intelligence and strategic vigilance in the Entrepreneurial Performance, as well as the role of strategic vigilance as an intermediate variable between competitive intelligence and Entrepreneurial Performance.