The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial time by using the Benders decomposition technique and cutting plane approximation. To ensure the nonincreasing character of the Benders upper limit, a local branching method was also added to improve the convergence. Simulation results indicated that the proposed method is superior to the existing method and has better overall performance.
This research aims to know the impact of leadership integrity as explanatory variable including its dimensions (courage, asceticism, justice, rationality, and humanity) on organizational conflict as responding variable. This research depended on the descriptive- constructive approach through the responses of a sample of (79) employees from (Real Estate Office of The State) in Al-Najaf province. The analyzing of the study done by using (Smart PLS) program to calculate (R2, t, p). Many results concluded and one of them, there is significant impact correlation of the leadership integrity on organizational conflict. There are many suggestions have been reached depending on the results reached and one of them is the necessity of de
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe research aims to shed light on the financing structure, which is one of the important pillars of financial management in the commercial banking sector, which enhances its financial position through financing its various investments, which is one of the pillars of the successful economy of the commercial banking sector. in which country. The contents of the research variables, which were represented by the independent variable, financing structure, the dependent variable, and investment decisions in commercial banks, which the researcher tried to address, as the research began with a basic variable that depends on diagnosing the impact of the financin
... Show MoreThe present research is descriptive and analytical by nature; it practically presents the method of implementing the standard pattern in an unconventional way using the bias-cut line. The study aims at investigating the variables of bias-cut and their suitability for fitting large-shaped Iraqi ladies. It also aims at exploring the artistic and innovative features of the bias-cut. Therefore, one needs to understand the rules and basics of clothing and the nature of the body to reach the maximum degree of control.Consequently, the study is to answer the following questions: What is the effectiveness of tailoring on the bias-cut in fitting a standard template of a large-shaped Iraqi ladies? Is it possible to obtain from the offered possibil
... Show MoreThe tax base is one of the bases of the technical organizing of taxes, and that a good selection of the tax base effects the outcome of the tax and its fairness, and with the expansion of the tax range results a dangerous phenomenon called tax evasion, which became threaten the economies of countries and this phenomenon prevents the achievement of the state to its economic, political and social objectives which seeks to resolve this phenomenon and identifying all human and material potential and realize the real reasons that lie behind it. The researcher found that tax authorities are weak in terms of it the technical material and financial abilities, the analysis of data show that then is a significant reve
... Show MoreThe current research aims to investigate the effect of a specimen of Daniel in the acquisition of concepts for the Arabic language curricula material to the students of the third phase of the Faculty of Basic Education Department of Arabic Language. The sample consists of (93) applications and a student of (47) students in the Division (A), which represents the experimental group which studied the use of a specimen of Daniel, and (46) students in the Division (B), which represents the control group, which studied the traditional way. The subject of unified two groups, which subjects the Arabic language curricula which includes six chapters.
The duration of the experiment is a full semester. The researchers also prepared a tool for mea
This study included estimation of glutathione (GSH) and Malondialdehyde (MDA) levels in the serum of diabetic patients type II who are treated with a polyherbs mixture (Nigella sativa, Trigonella foenum-graeum, Cyperus rotundus and Teucrium polium) for three months of treatments. Seventy samples of diabetic patients Type II male and females with age about (35-60) years were taken including 44 samples for group one (24 male, 20 female) who used herbs accompanied with chemical treatment (drugs) and 26 samples for the second group (13male and 13 female) who used herbs only. These groups were compared with 60 samples obtained from healthy persons (29 male, 31 female) at the same age of patients as a control group. Effect of age and treatment fo
... Show MoreLet R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.
Inˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.