The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environment in terms of execution time(makespan) and operating costs for Bag-of-Tasks applications. A task scheduling evolutionary algorithm has been proposed. A single custom representation of the problem and a uniform intersection are built for the proposed algorithm. Furthermore, the individual initialization and perturbation operators (crossover and mutation) were created to resolve the inapplicability of any solution found or reached by the proposed evolutionary algorithm. The proposed ETS (Evolutionary Task Scheduling algorithm) algorithm was evaluated on 11 datasets of varying size in a number of tasks. The ETS outperformed the Bee Life (BLA), Modified Particle Swarm (MPSO), and RR algorithms in terms of Makespan and operating costs, according to the results of the experiments.
The research statement to the amount of the contribution of information and communication technology in the quality of tourism and hotel services, and determine the relationship between the impact of information and communication and the quality of tourism services technology, The importance of the research is to establish the philosophical thinking of the nature of variables, as a modern administrative terminology and employ them towards the quality of tourism and hotel services, the research dealt with a problem expressed by a number of intellectual and practical questions, Was formulated based on the current situation witnessed by the tourism sector and hotel in Iraq, and the real gap was the lack of awareness of the impo
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThis research deals with a part of our heritage and Arab culture, which is the poetry of contemporary Islamic poets, especially the poetry that was said in the mother in contemporary Islamic poetry, when extrapolating the offices of some contemporary Islamic poets found a clear presence of the mother, and during the search for the subject or its I found that the subject did not receive research and study, although the bureaus of contemporary Islamic poets included in it a huge amount of verses in which they stood at the mother Pharthua, and expressed their feelings and emotions towards them, and accordingly this research tagged (mother in contemporary Islamic poetry _ Dr Artistic models in models of contemporary Islamic poetry) to stand
... Show MoreThe objective of the research is to shed light on the nature of the impact of the activities of the national strategy for poverty alleviation in achieving the goals of sustainable development, and the research problem was represented by Is there an effect of the activities of the national strategy for poverty reduction in achieving the goals of sustainable development? and represents the field of research in the Ministry of Labor and Social Affairs For the years (2012-2016) and the results of the sustainable development goals indicators for the years (2012-2016), the ready-made statistical program (SPSS ver.10) was used to calculate the percentages, multiple linear regression equation, the F test and the R2 coefficient, and the research
... Show MoreThe present study discusses the names of the Day of Resurrection in Uri Rubin’s translations of the Holy Qur’an. To identify the translation difficulties and complications and to find out the Hebrew equivalence, the study, through the application of a comparative analytical approach, aims at analyzing the linguistic structures of Day of Resurrection names cited in the Holy Qur’an. Heavenly religions are rich with distinct and unique terms that distinguish and reflect their specificity of other religions; something requires a great accuracy in the translation of such terminology. By investigating selected examples of the names of the Day of Resurrection in Arabic and Hebrew, the present study sheds light on the morphological and semant
... Show MoreElectronic banking plays a prominent role in providing the best banking services and upgrading the banking sector for the better, so this study aimed to shed light on the most prominent obstacles that prevent the application of electronic banking in banks operating in the city of Nasiriyah, and in order to achieve this goal the researcher used the descriptive analytical approach And through a questionnaire form that was distributed to a group of employees, numbering (60) employees in the upper, middle and operational departments in a number of branches of private banks operating in the city of Nasiriyah, namely (the Iraqi Trade Bank, the Gulf Commercial Bank, the Bank of Baghdad, the Union Bank of Iraq), which represented The stu
... Show MoreThis study focuses on studying an oscillation of a second-order delay differential equation. Start work, the equation is introduced here with adequate provisions. All the previous is braced by theorems and examplesthat interpret the applicability and the firmness of the acquired provisions