The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environment in terms of execution time(makespan) and operating costs for Bag-of-Tasks applications. A task scheduling evolutionary algorithm has been proposed. A single custom representation of the problem and a uniform intersection are built for the proposed algorithm. Furthermore, the individual initialization and perturbation operators (crossover and mutation) were created to resolve the inapplicability of any solution found or reached by the proposed evolutionary algorithm. The proposed ETS (Evolutionary Task Scheduling algorithm) algorithm was evaluated on 11 datasets of varying size in a number of tasks. The ETS outperformed the Bee Life (BLA), Modified Particle Swarm (MPSO), and RR algorithms in terms of Makespan and operating costs, according to the results of the experiments.
Abstract
Business organizations are using the technological innovations like cloud computing (CC) as a developmental platform in order to improve the performance of their information systems. In that context, our paper discusses know-how in employing the public and private CC to serve as platforms to develop the evaluation system of annual employees' performance (ESAEP) at Iraqi universities. Therefore, we ask the paper question which is “Is it possible to adopt the innovative solutions of ICTs (Like: public and private CC) for finding the developmental vision about management information systems at business organizations?”. In addition, the paper aim
... Show MoreSurvivin, a member of inhibitor of apoptosis family is increasingly used as a target for cancer therapy design because it has a key role in cell growth and inhibition of cell apoptosis. Also it can be used as a biomarker for targeting cancer because it is found in almost all cancer but not normal cells. Our strategy was to design (computationally) a molecule to be used as survivin inhibitor. This molecule was named lead10 and was used furthermore to find (virtually) existing drugs with a good survivin inhibition activity.
Coral reef area in northwest of the Arabian Gulf was investigated for mineralogy and geochemistry to throw lights on such unique Iraqi Marine Environment; six specimens of two main species of coral reefs, Platygyra pini Chevalier, 1975 and Octocoral Menella were collected at two sites. While eight samples of the surrounding sediments are chosen from other two sites. The mineralogy is determined by XRD, and reveals that calcite, low magnesium-calcite, and aragonite are the main minerals that comprise the Octocoral Menella in site 1, whilst aragonite and calcite are dominate in the P. pini coral reef at site 4.
The non–carbonate fractions indicate that thes
... Show MoreThe estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To
... Show MoreThe Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods depended on selecting the primes p and q in order to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article gives new construction of the RSA algorithm and DH key exchange using the
primes p,qfrom areal number x.
The impact of applying the K-W-L self-scheduling technique on first-year intermediate students' learning of basic volleyball skills, Ayad Ali Hussein*, Israa Fouad Salih
There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com
... Show MoreA field experiment was conducted in Yusufiya sub-district - Mahmudiya township/Baghdad governorate in silty loam texture soil during the spring season of 2020. The experiment included three treatments with three replicates, as the Randomized Complete Block Design (RCBD) was used according to the arrangement of the split design block. The treatments are in the irrigation system, which included surface drip irrigation (T1) and sprinkler irrigation (T2). Secondly, the Irrigation levels including the irrigation using 0.70 Pan Evaporation Fraction PEF (I1), irrigation using 1.00 PEF (I2), and irrigation using 1.30 PEF (I3). Coupled with, Pota
... Show MoreThe method of incineration was chosen to treat the most commonly used antimicrobial agents in Iraq (Triclabendazol, Oxfendazol, Mebendazole), which are antibiotics for children. The moisture content and chemical oxygen demand (COD) were examined and the results were (93.34, 94.88, 92.97)%, (52000, 33200, and 64000) mg/ L. The temperature was determined as a variable in the burning process (600, 500, 400)° C for the purpose of calculating the loss of ignition LOI and determining the ideal temperature. The results of the models (Triclabendazol, Oxfendazol, Mebendazole) (94.92, 93.12, 58.81% and 88.87), (62.61, 44.08%, 98.75, 84.98 and 55.086)% respectively. When mixing the three models in equal proportions, the percentage of loss was 92.8
... Show More