The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environment in terms of execution time(makespan) and operating costs for Bag-of-Tasks applications. A task scheduling evolutionary algorithm has been proposed. A single custom representation of the problem and a uniform intersection are built for the proposed algorithm. Furthermore, the individual initialization and perturbation operators (crossover and mutation) were created to resolve the inapplicability of any solution found or reached by the proposed evolutionary algorithm. The proposed ETS (Evolutionary Task Scheduling algorithm) algorithm was evaluated on 11 datasets of varying size in a number of tasks. The ETS outperformed the Bee Life (BLA), Modified Particle Swarm (MPSO), and RR algorithms in terms of Makespan and operating costs, according to the results of the experiments.
The preparation of the phenanthridine derivative compound was achieved by adopting an efficient one-pot synthetic approach. The condensation of an ethanolic mixture of benzaldehyde, cyclohexanone and ammonium acetate in a 2:1:1 mole ratio resulted in the formation of the title compound. Analytical and spectroscopic techniques were used to confirm the nature of the new compound. A mechanism for the formation of the phenanthridine moiety that is based on three steps has been suggested
The aim of this study was to making an analytical study in some kinematics variables in (200) meter breaststroke swimming to first ranking in championship 2003 – Spanish. The swimming in our country still suffering from several obstruction with retarded it’s development for the better since the investigators observe the insufficiency of swimming in our country to any analytical study for the international champions, this led to no specific and scientific discovering to these advanced levels as the estimation of the value of performance from the Iraqi coaches dependent on personality observation dependent on their opinion without referring to the specific and scientific diction. The investigators dependent on several kinematics variables
... Show MoreThis study deals with segmenting the industrial market as an independent variable and targeting the industrial market as a dependent variable. Since the industrial sector represents one of the most important fundamental pillars to build the economies of countries and their development , the Iraqi industrial sector was chosen as a population for the study . Based on measuring the study variables , identifying them and testing the correlation and effect on each other , the study reached a group of findings:
1- Increasing the level of availability of study variables inside the companies “The study sample”.
2- There is a correlation between the independent v
... Show MoreBackground: Job satisfaction remains as an important concern for both employer and employee. A high-quality teaching staff is the cornerstone of a successful educational system. One step in developing a high quality faculty understands the factors associated with teaching quality and retention. One of these factors is job satisfaction, which has been studied widely by organizational researchers.Objectives: To evaluate the extent of job satisfaction of teaching staff working at AL-Kindy College of medicine and to identify some work-related factors associated with job satisfaction.Methods: A cross- sectional study was carried out. A convenient sample of 50 teaching staff, who had a teaching job at different scientific departments at AL-Kin
... Show MoreReverse Osmosis (RO) has already proved its worth as an efficient treatment method in chemical and environmental engineering applications. Various successful RO attempts for the rejection of organic and highly toxic pollutants from wastewater can be found in the literature over the last decade. Dimethylphenol is classified as a high-toxic organic compound found ubiquitously in wastewater. It poses a real threat to humans and the environment even at low concentration. In this paper, a model based framework was developed for the simulation and optimisation of RO process for the removal of dimethylphenol from wastewater. We incorporated our earlier developed and validated process model into the Species Conserving Genetic Algorithm (SCG
... Show MoreThe paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreRecently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show More