389 research outputs found

    Video streaming over Ad hoc on-demand distance vector routing protocol

    Get PDF
    Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive nertwork for information transmission in many applications where the customer programme can begin showing the information before the whole record has been transmitted. Ad hoc On-demand Distance Vector (AODV) protocol is considered as one of the most important routing protocols in MANET. However, routing protocols assume a crucial part in transmission of information over the network. This paper investigates the performance of AODV Routing Protocol under video traffic over PHY IEEE 802.11g. The protocol model was developed in OPNET. Different outcomes from simulation based models are analyzed and appropriate reasons are also discussed. A different scenarios of video streaming were used. The metric in terms of throughput, end to end delay, packet delivery ratio and routing overhead were measured. A comparision with GRP and GRP are also reported

    Handwritten Arabic word/character recognition : common approaches

    Get PDF
    Offline handwriting word recognition is the automatic transcription by computer, where only the image of the handwriting is available. The recognition operation includes many steps, the segmentation step and the recognition step of offline handwritten Arabic words are suggested to be implemented using different techniques, since off-line Arabic character recognition operations involves many inter-related steps that can't be separated from each other, as a simple genes of operations, the two steps has to be discussed together. What makes Arabic handwriting words recognition so challenging is that unlike Latin, Arabic is written right to left and is always cursive. Letters are joined together along the writing line to form words or sub-words. The Arabic Alphabet has 28 letters, each with two to four shapes. The shape of a letter is determined by its position within the word: Initial, medial, or final, if we included character recognition as well as the word recognition, there would be another shape for each character, which is the isolated character. The researchers in this field have proposed many techniques to solve the problems; such as cursiveness of the Arabic handwritten words, in this paper a review of the used techniques, followed by a comparison to show the pros and cons of each technique are conducte

    Ethical Issues In Monitoring And Based Tracking Systems

    Get PDF
    Monitoring and based tracking systems use a variety of technologies to record and monitor the activities of humans.  This can increase the risks to the privacy and security of individuals. The amount of information gathered about individuals is growing through the proliferation of surveillance cameras, sensors; microchips and Radio Frequency Identification RFID tags embedded in devices and products. Advances in electronic technologies allow companies and government agencies to store and process large amounts of information about individuals. The Internet provides the ultimate copier device, making this information easily available to millions. This paper highlights the ethical issues emerging with the new technologies in the monitoring and base tracking system. New regulations should be proposed to protect the individual privacy. ABSTRAK: Pemantauan dan sistem berasaskan pengesanan menggunakan pelbagai teknologi untuk merakam dan memantau aktiviti manusia. Ini boleh meningkatkan risiko dari segi privasi dan keselamatan individu. Jumlah maklumat yang dikumpulkan tentang individu berkembang melalui proliferasi pengawasan kamera, sensor; mikrocip dan tag frekuensi radio yang diletakkan di dalam peranti dan produk. Kemajuan dalam teknologi elektronik membolehkan syarikat-syarikat dan agensi-agensi kerajaan menyimpan dan memproses sejumlah besar maklumat mengenai individu. Internet menyediakan peranti salinan utama, menjadikan maklumat ini didapati dengan mudah. Kajian ini memaparkan isu-isu etika yang baru muncul dengan teknologi baru dalam pemantauan dan sistem berasaskan pengesanan. Peraturan baru perlu dicadangkan untuk melindungi privasi individu. Keywords: Privacy Implications, Tracking Systems, Ethical Issue, RFI

    The second season of excavations at Jebel Moya (south-central Sudan)

    Get PDF
    This report presents the latest data from ongoing excavations at Jebel Moya, Sudan. This year saw the opening of five new trenches and continued excavation of an archaeologically rich trench. We have recovered four individual burials, a mud brick wall and a number of animal and archaeobotanical remains. The excavations also yielded a longer pottery sequence, showing clearly that the site was in use by at least the sixth millennium BC. This season confirms the long and complex history of Jebel Moya and provides the material for future studies on population health and subsistence. This season also saw an increase in community engagement and a more detailed study of the various historical trajectories that make up the biography of Jebel Moya

    Performance evaluation of uplink shared channel for cooperative relay based narrow band internet of things network

    Get PDF
    – Low Power Wide Area Network (LPWAN) is one of the fastest growing network techniques provides efficient communciations for smart cities, e-Health, industry 4.0 and other applications. LPWAN enables long-rang communcaitons for M2M and cellular IoT networks. Narrowband-IoT (NB-IoT) is a type of LPWAN developed by 3GPP to connect a wide stream of IoT services and devices. NB-IoT systems rely on the mechanism of repeating the same signal every specified period of time in order to improve radio coverage better than it is in LTE systems. Repetition process is used to enhance the coverage of NB-IoT and for upgrade throughput as well. However, increasing the repetition of the signal significantly may give a negative result relative to the bandwidth limits. A cooperative relay (CoR) can be used beside repetition mechanism to helps reduce bandwidth stress. Moreover, the use of CoR for NB-IoT in physical uplink shared channel with repetitions will enhance the throughput. This paper will evaluate the performance of the CoR to enhance physical uplink shared channel in NB-IoT. The NB-IoT system model is simulated bu MATLAB to demonstrate the use of Cooperative relay (CoR) scheme in NPUSCH for NB-IoT for performance evaluation and comparison of using CoR scheme by considering metrics like data rate, throughput, and delay. The results conclude that in using CoR in NB-IoT gives high performance in overall NoT network throughput

    Conserved Quantities in Noncommutative Principal Chiral Model with Wess-Zumino Term

    Full text link
    We construct noncommutative extension of U(N) principal chiral model with Wess-Zumino term and obtain an infinite set of local and non-local conserved quantities for the model using iterative procedure of Brezin {\it et.al} \cite{BIZZ}. We also present the equivalent description as Lax formalism of the model. We expand the fields perturbatively and derive zeroth- and first-order equations of motion, zero-curvature condition, iteration method, Lax formalism, local and non-local conserved quantities.Comment: 14 Page

    Occupational hazard in urolithiasis patients in Qatar: a single-center cross-sectional study

    Get PDF
    Background: Urolithiasis is one of the most prevalent urological diseases and is associated with a substantial economic burden. Its prevalence varies according to geographical location. Qatar is a Middle Eastern country located in the Afro-Asian Stone Belt. It has a dry and hot climate, which may predispose individuals working in these environments to form kidney stones (KSs). Methods: A population sample of 4204 patients was categorized into five occupational classes. The frequencies and correlations of these occupations with KS formation were calculated. Results: Among the total cases, 2000 presented with KSs, with the majority being of Asian descent (49%), followed by individuals of Middle Eastern descent (35.1%). Technicians accounted for 35.15% of KS cases followed by clerks (29.2%) and executives (14.6%). Among KS cases, 44% had a single stone, 30% had multiple stones, and 26% had two stones. In comparing both KS and non-KS groups, age, gender, occupation, and race were significantly associated with KS formation (p-value 0.05). Asian males aged 31-40, working as technicians, were significantly more prone to urolithiasis. In comparing age, BMI, and gender with stone characteristics, only age was found significantly associated with stone size (p-value 500 HU in executives and clerks (p-value < 0.001). Conclusions: Our findings revealed an elevated risk of urolithiasis among certain occupational groups, particularly technicians, who frequently work outdoors in high-temperature environments. Alternatively, the sedentary nature of clerical and executive positions can also contribute to the risk of urolithiasis
    • …
    corecore