Since the introduction of the HTTP/3, research has focused on evaluating its influences on the existing adaptive streaming over HTTP (HAS). Among these research, due to irrelevant transport protocols, the cross-protocol unfairness between the HAS over HTTP/3 (HAS/3) and HAS over HTTP/2 (HAS/2) has caught considerable attention. It has been found that the HAS/3 clients tend to request higher bitrates than the HAS/2 clients because the transport QUIC obtains higher bandwidth for its HAS/3 clients than the TCP for its HAS/2 clients. As the problem originates from the transport layer, it is likely that the server-based unfairness solutions can help the clients overcome such a problem. Therefore, in this paper, an experimental study of the server-based unfairness solutions for the cross-protocol scenario of the HAS/3 and HAS/2 is conducted. The results show that, while the bitrate guidance solution fails to help the clients achieve fairness, the bandwidth allocation solution provides superior performance.
The subject of fear is one of the most important tasks that one should seek to find out the reasons behind it, and push it up with all its sound mental concepts.
The main reason for the lack of security and fear and disturbance in the world is to commit the legitimate violations that God warned us in his Holy Book as well as in the Sunnah of His Prophet (peace be upon him).
The talk about the causes of fear in the Koran is not limited to the word (fear) Fakk but came in different and varied methods such as (horror) and (awe) and (shares) and (narrow).
The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreIn the drilling and production operations, the effectiveness of cementing jobs is crucial for efficient progress. The compressive strength of oil well cement is a key characteristic that reflects its ability to withstand forceful conditions over time. This study evaluates and improves the compressive strength and thickening time of Iraqi oil well cement class G from Babylon cement factory using two types of additives (Nano Alumina and Synthetic Fiber) to comply with the American Petroleum Institute (API) specifications. The additives were used in different proportions, and a set of samples was prepared under different conditions. Compressive strength and thickening time measurements were taken under different conditions. The amoun
... Show MoreThe research aims to evaluate Islamic electronic libraries and their service for downloading research and illustrated books, explaining their origins, features and types. The research was limited to the libraries available on the Internet that provide the service for downloading research and illustrated books. The researcher relied on the survey approach to identify the libraries and a sample of them (20 libraries) was selected. For the purpose of evaluating it according to five criteria related to the preparation and publication of Islamic electronic libraries (the responsible party, the goals and objectives, the year, the services it provides, the sections and subject specializations of its contents) and five criteria related to the servi
... Show MoreMost of us are tired of the circumstances that surround us because of their deficiency, deprivation, and sullenness, even though troubles and pains are the soil in which the seeds of strong personality sprout.
The content of the research is summed up in the fact that there is no need to frown, so let our face be free, and our word good and tolerant, so that we can be the most loving people of those who give them, and the Messenger of God (may God’s prayers and peace be upon him and his family) was known to be the heaviest concerns of people, but he was most smiling of people, by smiling, we buy lives, so we should get used to it, because that gives us hope and finds the world in our hands, an
... Show MoreThe aim of this work is study the partical distribution function g(r12,r1) for Carbon ion cases (C+2,C+3,C+4) in the position space using Hartree-Fock's Wave function, and the partitioning technique for each shell which is represented by Carbon Ions [C+2 (1s22s2)], [C+3 (1s22s)] and [C+4 (1s2)]. A comparision has been made among the three Carbon ions for each shell. A computer programs (MATHCAD ver. 2001i) has been used texcute the results.
The In this experimental study, natural stone powder was utilized to improve a cohesive soil’s compaction and strength properties. According to the significant availability of limestone in the globe, it has been chosen for the purpose of the study, in addition to considering the existing rock industry massive waste. Stone powder was used in percentages of 4, 8, 12, 16% replaced from the soil weight in dry state. Some of cohesive soil’s consistency, shear, and compaction properties were depicted after improvement. The outcomes yielded in significant amendments in the experimented geotechnical properties after stone powder addition considering 60 days curing period. Cohesion and friction angle were notably increased by
... Show MoreIn this work, a numerical study is performed to predict the solution of two – dimensional, steady and laminar mixed convection flow over a square cylinder placed symmetrically in a vertical parallel plate. A finite difference method is employed to solve the governing differential equations, continuity, momentum, and energy equation balances. The solution is obtained for stream function, vorticity and temperature as dependent variables by iterative technique known as successive over relaxation. The flow and temperature patterns are obtained for Reynolds number and Grashof number at (Re= -50,50,100,-100) (positive or negative value refers to aidding or opposing buoyancy , +1 assisting flow, -1 opposing flow) and (102 to 105) , respective
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreHealthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopt
... Show More