Preferred Language
Articles
/
nReoTJIBVTCNdQwCGqrG
Mpeg-Dash System via HTTP2 Protocol with HEVC Encoder for Video Streaming Services
...Show More Authors

MPEG-DASH is an adaptive bitrate streaming technology that divides video content into small HTTP-objects file segments with different bitrates. With live UHD video streaming latency is the most important problem. In this paper, creating a low-delay streaming system using HTTP 2.0. Based on the network condition the proposed system adaptively determine the bitrate of segments. The video is coded using a layered H.265/HEVC compression standard, then is tested to investigate the relationship between video quality and bitrate for various HEVC parameters and video motion at each layer/resolution. The system architecture includes encoder/decoder configurations and how to embedded the adaptive video streaming. The encoder includes compression besides adaptive streaming, while decoder includes displaying of compressed video and the function of network sensing. The videos streaming is tested over two IP networks, Unicast and Multicast. A maps of network performance evaluation and how influences of different videos is achieved through sensors installed at main network nodes.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 03 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Integrated Grasshopper Optimization Algorithm with Artificial Neural Network for Trusted Nodes Classification Problem
...Show More Authors

Wireless Body Area Network (WBAN) is a tool that improves real-time patient health observation in hospitals, asylums, especially at home. WBAN has grown popularity in recent years due to its critical role and vast range of medical applications. Due to the sensitive nature of the patient information being transmitted through the WBAN network, security is of paramount importance. To guarantee the safe movement of data between sensor nodes and various WBAN networks, a high level of security is required in a WBAN network. This research introduces a novel technique named Integrated Grasshopper Optimization Algorithm with Artificial Neural Network (IGO-ANN) for distinguishing between trusted nodes in WBAN networks by means of a classifica

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Nurses' Knowledge About Chest Physiotherapy Techniques for Patients With Corona Virus Disease
...Show More Authors

Abstract

Objective(s): A descriptive study aimed to determine nurses' knowledge about chest physiotherapy techniques for patients with Corona virus disease and observe the relationship between nurses' knowledge and their socio-demographic characteristics.

Methodology: The study was directed in isolation units of Al- Hussein teaching hospitals in Thi-Qar, Iraq for the period from June 1st,  2022 to November 27th, 2022. Non- probability (purposively) sample comprised 41 nurses. A questionnaire was used for data collection and it consists of two parts: the first part comprises socio demographic features, the second part includes self- administered questionnaire sheet wa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
A Comparative Study on the Double Prior for Reliability Kumaraswamy Distribution with Numerical Solution
...Show More Authors

This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jul 08 2015
Journal Name
The Iraqi Postgraduate Medical Journal
Simultaneous Complete Intracorneal Ring Implantation with Intrapocket Collagen Cross- Linking for Treatment of Keratoconus
...Show More Authors

BACKGROUND: Keratoconus is a progressive non inflammatory bilateral (usually asymmetric) ectatic corneal disease characterized by paraxial stromal thinning ,weakening that lead to corneal surface distortion ,vision loss primarily from irregular astigmatism and myopia and secondly from corneal scar. OBJECTIVE: To evaluate visual and refractive outcomes after intracorneal continuous ring (ICCR) implantation combined with intrapocket corneal collagen cross linking in patient with keratoconus. Setting: Eye Specialty Private Hospital, Baghdad, Iraq. METHODS: This study assessed the results of implantation of Myoring ICCR combined with CXL in 40 eyes with KC. Outcome measures include UDVA,CDVA(spectacle correction),refraction, complications and s

... Show More
Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A hybrid Grey Wolf optimizer with multi-population differential evolution for global optimization problems
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Four Points Block Method with Second Derivative for Solving First Order Ordinary Differential Equations
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Agricultural And Statistical Sciences
Response of growth and yield of zea maize for foliar spraying with humic acid
...Show More Authors

Scopus (3)
Scopus
Publication Date
Sun Oct 02 2011
Journal Name
Journal Of Educational And Psychological Researches
Moral Intelligence and its Relationship with Academic Adjustment for Sixth Year Primary School Pupils
...Show More Authors

This research aims at measuring the relationship between moral intelligence and academic adjustment for sixth year primary School Pupils.

The research is assigned to sixth year primary school pupils- Baghdad –the 2nd   karkh of the both genders .The total sample includes (500) pupils .The researchers has built two scales one for Moral Intelligence and another for Academic Adjustment and applied them on the total sample of the research .The researchers treated data by appropriate statistical means .The research has reached the following results:

  • The pupils of sixth year primary school characterized by Moral Intelligence.
  • The

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of penetration Rate and cost with Artificial Neural Network for Alhafaya Oil Field
...Show More Authors

Prediction of penetration rate (ROP) is important process in optimization of drilling due to its crucial role in lowering drilling operation costs. This process has complex nature due to too many interrelated factors that affected the rate of penetration, which make difficult predicting process. This paper shows a new technique of rate of penetration prediction by using artificial neural network technique. A three layers model composed of two hidden layers and output layer has built by using drilling parameters data extracted from mud logging and wire line log for Alhalfaya oil field. These drilling parameters includes mechanical (WOB, RPM), hydraulic (HIS), and travel transit time (DT). Five data set represented five formations gathered

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Engineering, Technology & Applied Science Research
Two Proposed Models for Face Recognition: Achieving High Accuracy and Speed with Artificial Intelligence
...Show More Authors

In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref