Video streaming is widely available nowadays. Moreover, since the pandemic hit all across the globe, many people stayed home and used streaming services for news, education, and entertainment. However, when streaming in session, user Quality of Experience (QoE) is unsatisfied with the video content selection while streaming on smartphone devices. Users are often irritated by unpredictable video quality format displays on their smartphone devices. In this paper, we proposed a framework video selection scheme that targets to increase QoE user satisfaction. We used a video content selection algorithm to map the video selection that satisfies the user the most regarding streaming quality. Video Content Selection (VCS) are classified in
... Show MoreEngineering equipment is essential part in the construction project and usually manufactured with long lead times, large costs and special engineering requirements. Construction manager targets that equipment to be delivered in the site need date with the right quantity, appropriate cost and required quality, and this entails an efficient supplier can satisfy these targets. Selection of engineering equipment supplier is a crucial managerial process .it requires evaluation of multiple suppliers according to multiple criteria. This process is usually performed manually and based on just limited evaluation criteria, so better alternatives may be neglected. Three stages of survey comprised number of public a
... Show MoreObjectives: To choose the best mode of delivery
for term, frank or complete, breech presentation
through studying the perinatal outcome of each mode of
delivery decided when managing a group of pregnant
ladies presented with breech delivery in our centre.
Methods: One hundred and fifty pregnant ladies
presented at term with singleton, frank or complete,
breech presentation for delivery in our centre during the
period from May 2004 toAugust 2005.
Mode of delivery, parity, gestational age, maternal age,
maternal medical illness, and birth weight where the
variables that have been tested in each delivery
included in the study to verify their relationship to
perinatal outcome.
Results: No significant
The estimation of the regular regression model requires several assumptions to be satisfied such as "linearity". One problem occurs by partitioning the regression curve into two (or more) parts and then joining them by threshold point(s). This situation is regarded as a linearity violation of regression. Therefore, the multiphase regression model is received increasing attention as an alternative approach which describes the changing of the behavior of the phenomenon through threshold point estimation. Maximum likelihood estimator "MLE" has been used in both model and threshold point estimations. However, MLE is not resistant against violations such as outliers' existence or in case of the heavy-tailed error distribution. The main goal of t
... Show MoreThroughout what mentioned above, It is obvious that the aware narrator in these biography models was the strongest tool in presenting the content, especially the biographies under study were written by feminine hands, striving to prove her identity by all means and ways. In addition, we can suppose that the hiding of she writer behind the character is no more than a mask, by which she want to mask herself so that she can express herself frankly and freely, especially when she talks about subjects that are inconsistent with the society, customs and traditions. It is important to refer that the existence of the participant narrator in the biographies under study does not prevent the presence of another narrator such as external or aware na
... Show MoreThe current research aims to: 1- Identify the emotional sensitivity of children from the parents' point of view. 2- Identifying the differences in the emotional sensitivity of children from the parents ’point of view, according to the parents’ gender variable (father - mother). The basic research sample consisted of (285) male and female students from the sixth grade (primary school), chosen in a randomized stratified method from the districts (Al-Karkh and AlRasafa). While the sample of statistical analysis amounted to (200) father and (200) mothers of male and female students who were randomly selected from the sixth grade of the education directorates (Al-Karkh and Al-Rasafa). The two researchers also used a number of sta
... Show MoreWater flow into unsaturated porous media is governed by the Richards’ partial differential equation expressing the mass conservation and Darcy’s laws. The Richards’ equation may be written in three forms,where the dependent variable is pressure head or moisture content, and the constitutive relationships between water content and pressure head allow for conversion of one form into the other. In the present paper, the “moisture-based" form of Richards’ equation is linearized by applying Kirchhoff’s transformation, which
combines the soil water diffusivity and soil water content. Then the similarity method is used to obtain the analytical solution of wetting front position. This exact solution is obtained by means of Lie’s
Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More