The Protocol Independent Multicast - Sparse Mode (PIM-SM) uses one center (referred here as the Rendezvous Point “RP”) for all sources in a multicast group. PIM-SM distributes the multicast traffic of a source through a so-called shared distribution
tree, whose root is at a predefined core called Rendezvous Point (RP). It also builds source-specific trees to the sources whose data rates exceed a defined threshold. In the literature, several investigations are done to improve and provide an efficient mechanism for the dynamic relocation of the RP depending on the sources or the members of the multicast group. In this paper, we extend the investigation of three search algorithms used to find the optimal RP position. To evaluate the performance of these algorithms, Estimated Tree Cost (ETC) and our improvement Enhanced Estimated Tree Cost (EETC), are used. The reason behind our choice these two methods is a comparative investigation of the RP-selection methods proposed in the literature. From the comparison we can see that ETC finds the most optimal position of the rendezvous point. The Hill-Climbing algorithm and the standard PIM-SM protocol with static RP-selection are used as a reference for comparison. Our algorithms result in a lower network load compared to RP-selection algorithm. However, they need additional control messages.
The research handles the evaluation of the performance of teachers of secondary education in the city of
Latakia according to the criteria of total quality management from the perspective of supervisors and school
directors in the following areas:
planning and design of educational situations, classroom management and
the relationship with the students, mastery of educational material and follow-up, use of modern techniques,
student assessment, and the relationship with the local community. To achieve the objectives of the research,
a questionnaire was designed consisting of (37) items covering the fields of research, and distributed to a
sample of (41) educational supervisors, and (23) High School directors in the city of Lattakia.
In this paper, we propose modifications to TCP by
introducing adaptive delay and loss response (TCP-ADaLR) to
mitigate the adverse effects of satellite link characteristics.
Multitiered ecommerce applications are distributed applications where
application logic is divided into components according to function. These
components are installed on different machines, depending on the tier to
which the application component belongs , additionally, these
applications provide ecommerce services like online shopping
This paper addresses failure-prone
production line with limited buffers. Each machine is subject to
either time-dependent failures or operation dependent failures.
This paper focuses on application built using the Java Platform,
Enterprise Edition (Java EE).
In this application, the business-tier is
based on representational state transfer (RESTful) web services, and the
presentation tier adopts Angular(x) framework.
تقييم الأداء
performance evaluation
web applications
التطبيقات الموزعة
Distributed Applications
تطبيقات التجارة الالكترونية متعددةُ الطبقات
تطبيقات الوب
Multitiered ecommerce applications
خدمات وب نقل الحالة التمثيلية
Java EE7
AngularJS
Angular2
representational state transfer (RESTful) web services
chrome DevTools
المزيد..
The aim of the research was to evaluate the role of the head nurses in documenting,
evaluating and reviewing the performance of nursing staff at Tishreen University Hospital
from the point of view of nursing staff. Random sample was used , it consi
sted of 50% of
the nursing staff at Tishreen University Hospital during the application of the research
there number (300 ) nurses. A developed tool for collecting information was used based on
recent research literature, and data were collected and analyzed using SPSS version (20).
The most important results were that the evaluation of the role of the head nurses was at
moderate level in documenting and evaluating the performance of the nursing staff, while
the evaluation of the research sample for the role of the head nurses in reviewing their
performance was at a good level.
WLANs have evolved into the best choice in a number of situations such as government institutions and airports, but because of the open transport in these networks increased the possibility of security attacks, which required the use of security prot
ocols to protect the network and to protect users. This research examines and evaluates the impact of security protocols on WLAN performance in order to select the optimal protocol, the impact of these protocols on network performance has been evaluated by adding those Protocols to open source GloMoSim environment, And recent simulation results show that the performance of these protocols are varies according to the environment applied within them, noting that there is no effective Protocol in all environments, i.e. the suitable Protocol in an environment may be unsuitable in other ones. After comparing performance results in simulations with performance results in the real network, we can see that the best performance protocol is WEP. Also, The best protocol for both performance and security is the WPA2. Hence, our choice to one of the security protocols depends on what we want to secure in the level of protection and the performance of the network.