<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.</p>
Experiments have been conducted to study the local and average heat transfer by mixed
convection for hydrodynamically fully developed, thermally developing and fully developed
laminar upward air flow in an inclined annulus with adiabatic inner cast iron tube and uniform
heated outer aluminum tube with an aspect ratio ( Ω = 0.72) and (L/Dh≈40) for both calming and
test sections). A wide range of Reynolds number from 859 to 2024 has been covered, and heat
flux has been varied from 159 W/m2 to 812 W/m2 (these values of heat flux and Reynolds
number gave Richardson number range from 0.03 to 0.٣٨), with angles of annulus inclination
φ =0o (horizontal position), φ =60o (inclined position), and φ =90o (vertical posi
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication
... Show MoreThis work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera
... Show MoreThis research aims to the possibility of evaluating the strategic performance of the State Board for Antiquities and Heritage (SBAH) using a balanced scorecard of four criteria (Financial, Customers, Internal Processes, and Learning and Growth). The main challenge was that the State Board use traditional evaluation in measuring employee performance, activities, and projects. Case study and field interviews methodology has been adopted in this research with a sample consisting of the Chairman of the State Board, 6 General Managers, and 7 Department Managers who are involved in evaluating the strategic performance and deciding the suitable answers on the checklists to analyze it ac
... Show MoreStreamlined peristaltic transport patterns, bifurcations of equilibrium points, and effects of an inclined magnetic field and channel are shown in this study. The incompressible fluid has been the subject of the model's investigation. The Reynolds values for evanescence and an infinite wavelength are used to constrain the flow while it is being studied in a slanted channel with a slanted magnetic field. The topologies over their domestic and cosmopolitan bifurcations are investigated for the outcomes, and notion of the dynamical system are employed. The Mathematica software is used to solve the nonlinear autonomous system. The flow is found to have three different flow distributions namely augmented, trapping and backward flow. Outc
... Show MoreThe Research topic seeks to analyze the "political risk and its component Terrorism Index," which consists of five indicators index, a number of terrorist operations, and the number of dead and wounded, and the size of the physical losses, based search sub-index analysis of material losses for the index terrorism and its impact on the indicators listed on the Iraq Stock Exchange Finance. As for the practical side, it has been use style gradient unrestricted and link the sample represented by ten banks listed on the Iraq Stock Exchange. was Statement the correlation and interaction of variables of the studySearch results produced that the volume of material losses is the most important indicator in the influential force and it explain a v
... Show MoreThis study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp
... Show More