A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video streaming, it may also cause a video bitrate oscillation. So the video buffer structure is adjusted by adding two thresholds as operating points for overflow and underflow states to filter the impact of throughput fluctuation on video buffer occupancy level. Then a bandwidth prediction algorithm is proposed for enhancing the performance of video bitrate adaptation. This algorithm's work depends on the current video buffer level, video bitrate of the previous segment, and iterative throughput measurements to predict the best video bitrate for the next segment. Simulation results show that reserving a bandwidth margin is better in adapting the video bitrate under bandwidth variation and then reducing the risk of video playback freezing. Simulation results proved that the playback freezing happens two times: firstly, when there is no bandwidth margin used and secondly, when the bandwidth margin is high while smooth video bitrate is obtained with moderate value. The proposed scheme is compared with other two schemes such as smoothed throughput rate (STR) and Buffer Based Rate (BBR) in terms of prediction error, QoE preferences, buffer size, and startup delay time, then the proposed scheme outperforms these schemes in attaining smooth video bitrates and continuous video playback.
This study has aimed to measure the relationship between the skills required for the labor market and the employment of graduates of community colleges at King Khalid University. For gathering the required data, a questionnaire has been designed and distributed to the faculty members of community colleges at King Khalid University in a random sample method. The chosen sample size has covered (123) individuals. Questionnaire forms have been distributed and retrieved from (117) participants. Therefore, the estimated response has reached 95 % of the total sample size. The results of the study have shown that there is not any significant relationship between the skills which the graduates acquire and the requirements of employmen
... Show MoreThis current research aims to identify the effectiveness of a training program in developing moral intelligence and mutual social confidence among middle school students. The researcher made a number of hypotheses for this purpose to achieve the goal of the research.
The researcher relied on the (Al Zawaida 2011) scale prepared according to Coles (1997), including (60) items, and the mutual social trust scale for (Nazmi 2001) based on Roter's theory including (38) items.  
... Show MoreCeruloplasmin (Cp) is one of the acute phase protein, in this review ,we studied the level of ceruloplasmin with copper (Cu) and iron in 90 patients with coronary heart diseas ( those patients are divided into three groups, whom are stable angina , unstable angina and myocardial infarction compared with 30 healthy volunteers) and the roles of them as diagnostic and prognostic tools.The diagnosis was attend by a clinical examination carried out by the consult medical staff in Ibn AL-Nafis hospital. The result: ceruloplasmin recorded a significantly(p<0.05)higher level in all patient groups compared with the control, so this result supports the hypothesis that a high serum ceruloplasmin level is a risk factor for coronary heart di
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreTrickle irrigation is a system for supplying filtered water and fertilizer directly into the soil and water and it is allowed to dissipate under low pressure in an exact predetermined pattern. An equation to estimate the wetted area of unsaturated soil with water uptake by roots is simulated numerically using the HYDRUS-2D/3D software. In this paper, two soil types, which were different in saturated hydraulic conductivity were used with two types of crops tomato and corn, different values of emitter discharge and initial volumetric soil moisture content were assumed. It was assumed that the water uptake by roots was presented as a continuous sink function and it was introduced into Richard's equation in the unsaturated z
... Show More