The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. Existing research used metaheuristic algorithm to solve tak scheduling problem, however, must of the existing metaheuristics used suffers from falling into local mina due to their inefficiency to avoid unfeasible region in the solution search space. Therefore, there is a dire need for an efficient metaheuristic algorithm for task scheduling. This study proposed an FPA-ISFLA task scheduling model using hybrid flower pollination and improved shuffled frog leaping algorithms. The simulation results indicate that the FPA-ISFLA algorithm is superior to the PSO algorithm in terms of makespan time, resource utilization, and execution cost reduction, especially with an increasing number of tasks.
بدأت الشركات تخطو خطوات متسارعة باستخدام أنظمة تكنولوجيا المعلومات في عملياتها المالية وباعتماد قليل على الورق والذي يتم الاحتفاظ بالنسخ الأصلية منه تعزيزا للإجراءات التي تمت معالجتها الكترونيا. إن ممارسة الشركات وبشكل متزايد الأسلوب الواقعي (Virtualization) في علاقاتها مع الموردين والمستهلكين والشركاء أدى للحاجة المتزايدة للثقة والتأكيد على مثل هذه العلاقات مما يولد ضغطا كبيرا ع
... Show Moreتولي المجتمعات المتقدمة اجتماعياً واقتصاديا وثقافيا وعلميا اهتماما بارزا للعنصر البشري واستثماره على أفضل صورة ممكنة لتحقيق التقدم والرفاهية لتلك المجتمعات وللأفراد على حد سواء , وتحتل تنمية الثروة العقلية واستثمارها محل الصدارة حيث يبذل اهتمام خاص للكشف عن المواهب والكفاءات المبدعة وتنميتها وتوجيهها ورعايتها علميا وتربويا ومهنيا وذلك لان العنصر البشري يعد جزءا لا يتجزأ من الثروة القومية للأمة حيث
... Show MoreThe Studying of historian aspects in Al-Hadieth books , such as " Al-Musnad Book " subjected to Al-Imam Abi Yalaa Al-mousily" ,has great importance in the field of Islamic history , in which Al- Al-Imam Abi Yalaa Al-mousily has presented valued information that have significant impact on the understanding of history, Have a significant impact on the understanding of Islamic history
This search aims to meditate Divan of Hazem Al-Qirtagni his incomplete contiguous and non-contiguous naturalizations are investigated through two interrelated sections, the first is contiguous deficient naturalization and the analysis of phonemic symmetry in the light of syntactic syntax
This search aims to meditate Divan of Hazem Al-Qirtagni his incomplete contiguous and non-contiguous naturalizations are investigated through two interrelated sections, the first is contiguous deficient naturalization and the analysis of phonemic symmetry in the light of syntactic syntax, phonemic (partial) symmetry and semantic difference
Computational linguistics is a modern branch of linguistics concerned with computer processing of natural languages. It makes computer as human brain simulate to human mind to understand language endoscopy and application. It stems from the use of computers to create programs and information systems that help the user to solve linguistic issues such as translation, analysis, parsing, and others This research seeks to show the employability of Arabic grammar, especially the past tense of it, in the light of this theory The study made use of the computer program (Madamera) to apply its samples of past phrasal verbs, In its methodology
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
حل الاشكالية المنهجية في العلوم الانسانية المنهج البنيوي انموذجاً مقترحاً
ن الهدف من هذا البحث هو معرفة أثر إستراتيجية تعليمية في تحصيل مادة العلوم لدى طلاب الصف الاول المتوسط. ولتحقيق هدف البحث صاغ الباحثان الفرضية الآتية: لا توجد فروق ذو دلالة إحصائية عند مستوى (0,05) بين متوسط درجات طلاب المجموعة التجريبية الذين يدرسون مادة العلوم وفق إستراتيجية تعليمية وبين متوسط درجات طلاب المجموعة الضابطة الذين يدرسون المادة نفسها بالطريقة التقليدية في اختبار التحصيل. بلغت عينة البحث (59) طالبا
... Show More