The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. Existing research used metaheuristic algorithm to solve tak scheduling problem, however, must of the existing metaheuristics used suffers from falling into local mina due to their inefficiency to avoid unfeasible region in the solution search space. Therefore, there is a dire need for an efficient metaheuristic algorithm for task scheduling. This study proposed an FPA-ISFLA task scheduling model using hybrid flower pollination and improved shuffled frog leaping algorithms. The simulation results indicate that the FPA-ISFLA algorithm is superior to the PSO algorithm in terms of makespan time, resource utilization, and execution cost reduction, especially with an increasing number of tasks.
The role of internal control is based on the effectiveness of the budget through an analysis of the reality of the budget in the research sample as it was studied in the preparation and preparation stages and the implementation stage. The sample showed that the sample did not comply with what is stated in the Ministry of Finance publication of instructions and ceilings. In the process of preparing and resulting from the occurrence of deviations in large proportions both in the discussion of the Ministry of Finance or when implementation as a low rate of implementation and the absence of allocations for some items, although there is a need for them as well as the transfer of large proportions of transfers both up or down and the purpose o
... Show MoreThis study aimed to provide a theoretical framework for the impact of the Turkish intervention in northern Syria and the extent of its impact on the relations between the two countries.
It also sought to answer the study's main question: What is the impact of the Turkish intervention in northern Syria on Turkish-Syrian relations during the period 2011-2019 ?.
In this study, the historical method, the descriptive method, and the systems analysis method were used, with the aim of arriving at an accurate and realistic understanding of the Turkish-Syrian relations.
The study reached a set of results, the most important of which was that the Syrian-Turkish relations are based on interests, and that all alliances and
... Show MoreThe aim of this work is to study the effect of diesel fuel percentage on the combustion processes in compression ignition engine using dual – fuel (diesel and LPG).
The brake thermal efficiency increased with the increase of diesel fuel rate at low loads, and decreased when load increased. To get sufficient operation in engine fueled with dual fuel, it required sufficient flow rate of diesel fuel, if the engine fueled with insufficient diesel fuel erratic operation with miss fire cycles presented.
Dual-fuel operation at part load showed higher specific fuel consumption than straight diesl operation. At full loads, brake specific fuel consumption of duel fuel engine approaches that for diesel fuel values.
Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreStrategy Descrtibes How an Organization Matches its own Capabilites With Opportunities in Environment , in Order to Accomplish its Overall Objectives , So That The Organization is Considering Responding to Challenges by Adopting one or More of Strategies, Like Differentioning its Product, or Achieving Cost Leadership.
The Key Role of Management Accountant is to Evlaute The Successful it Has Been in Implementing Organization Strategy.
This Research Target to Explain The Key Role of Management Accountant in Evaluate of Organization Strategy. by Strategic Analysis of Operating Income From Specific Sources Such as Cost Savings and Growth in Stead of Emphasizing Only The Aggrega
... Show MoreThe influx of Arab Qahtani and Nizari tribes continued to the countries of Baluchistan and the Levant in pre-Islamic times until the Levant became open to the Arab-Islamic tide during the first century AH. The Islamic Orient until the early Islamic Arab Army reached the western borders of China. What we will see in the folds of the search.
The aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who hav
... Show MoreIn this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%
... Show MoreAbsence or hypoplasia of the internal carotid artery (ICA) is a rare congenital anomaly that is mostly unilateral and highly associated with other intracranial vascular anomalies, of which saccular aneurysm is the most common. Blood flow to the circulation of the affected side is maintained by collateral pathways, some of which include the anterior communicating artery (Acom) as part of their anatomy. Therefore, temporary clipping during microsurgery on Acom aneurysms in patients with unilateral ICA anomalies could jeopardize these collaterals and place the patient at risk of ischemic damage. In this paper, we review the literature on cases with a unilaterally absent ICA associa