Preferred Language
Articles
/
bsj-10084
Efficient Task Scheduling Approach in Edge-Cloud Continuum based on Flower Pollination and Improved Shuffled Frog Leaping Algorithm
...Show More Authors

The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. Existing research used metaheuristic algorithm to solve tak scheduling problem, however, must of the existing metaheuristics used suffers from falling into local mina due to their inefficiency to avoid unfeasible region in the solution search space. Therefore, there is a dire need for an efficient metaheuristic algorithm for task scheduling.  This study proposed an FPA-ISFLA task scheduling model using hybrid flower pollination and improved shuffled frog leaping algorithms. The simulation results indicate that the FPA-ISFLA algorithm is superior to the PSO algorithm in terms of makespan time, resource utilization, and execution cost reduction, especially with an increasing number of tasks.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 30 2021
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and Machine learning algorithm
...Show More Authors

The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Engineering
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
...Show More Authors

A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
An algorithm for binary codebook design based on the average bitmap replacement error (ABPRE)
...Show More Authors

In this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 19 2024
Journal Name
An International Journal Of Optimization And Control: Theories & Applications (ijocta)
Design optimal neural network based on new LM training algorithm for solving 3D - PDEs
...Show More Authors

In this article, we design an optimal neural network based on new LM training algorithm. The traditional algorithm of LM required high memory, storage and computational overhead because of it required the updated of Hessian approximations in each iteration. The suggested design implemented to converts the original problem into a minimization problem using feed forward type to solve non-linear 3D - PDEs. Also, optimal design is obtained by computing the parameters of learning with highly precise. Examples are provided to portray the efficiency and applicability of this technique. Comparisons with other designs are also conducted to demonstrate the accuracy of the proposed design.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (10)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Anatomical histological structure of the cerebellum in the Iraqi frog Rana ridibunda ridibunda
...Show More Authors
Abstract<p>The current study was designed to investigate the histological structure of the cerebellum in the Iraqi frog <italic>Rana ridibunda ridibunda</italic>. The cerebellum was removed surgically from 20 Iraqi frogs, <italic>Rana ridibunda ridibunda</italic>, and preserved in fixative of 10% formalin solution for a period of 72 hr, then the histological sections were prepared by the method of paraffin. The results of the study showed that the cerebellum of the adult Iraqi frog is one of the rhombencephalon regions, and consists of three layers, molecular layer, purkinje cells layer, and granular layer. The present histological findings suggest that the cerebellum of the </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the cost of consulting services under the traditional cost approach and the performance-based costing technique and its impact on achieving profits : Applied research in the advisory office of Al-Khwarizmi College of Engineering - University of Baghdad
...Show More Authors

Abstract:

                    This research aims to apply the Performance Focused Activity Based Costing System in the consultant office of Al-Khwarizmi College of Engineering at the University of Technology for the purpose of measuring the cost of consulting services provided by these offices in order to reduce costs and their reflection in achieving profits. For the purpose of calculating costs accurately, and to test the hypothesis of the research, the research was applied in the office of the consultant of the College of Engineering Al-Khwarizm - University of Baghdad through the financial statement

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Scheduling Critical Activities of Stochastic Projects Management
...Show More Authors

In this paper, we consider the problem of stochastic project network when some or all activities are interrupted. An approach has been built to schedule the critical activities, by constructing some expressions based on the project lateness costs due to the interruption activities. Two simple example are presented to validate our approach.

Key words: Project Management, Project scheduling, Stochastic activity duration, Stochastic PERT.    

Introduction

   Recently, Projects planning and optimal timing, under uncertainty are extremely critical for many organizations, see [19]. Having an effective mathematical model wi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
A Theoretical Investigation of Chemical Bonding of a Heterometallic Trinuclear Cluster Containing Iridium and Ruthenium: [(Cp*Ir) (CpRu)2 (μ3-H) (μ-H)3] by QTAIM Approach
...Show More Authors

  Numerous integral and local electron density’s topological parameters of significant metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp* Ir) (Cp Ru)23-H) (μ-H)3]1 (Cp = η5 -C5Me5), (Cp* = η5 -C5Me4Et) were calculated and interpreted by using the quantum theory of atoms in molecules (QTAIM). The properties of bond critical points such as the delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density 2ρ(r), the local energy density

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Aug 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Edge Detection Using Circular Sliding Window
...Show More Authors

    In this paper, we devoted to use circular shape sliding block, in image edge determination. The circular blocks have symmetrical properties in all directions for the mask points around the central mask point. Therefore, the introduced method is efficient to be use in detecting image edges, in all directions curved edges, and lines. The results exhibit a very good performance in detecting image edges, comparing with other edge detectors results.

View Publication Preview PDF