The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual resource, by combining two types of algorithms: dynamic algorithm (adaptive firefly) and static algorithm (weighted round robin). The results show improvement in resource utilization, increased productivity, and reduced response time.
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe Industrial Banks in most countries in the world plays an essential and vital role in developing the industrial sector due to its effective importance in the economic and social development. The research aims to study the ability of the Industrial Bank of Iraq to the growth and development of the mixed industrial sector companies through loans granted to them. In addition, the research seeks to study credit policies pursued by the Industrial Bank of Iraq to finance the mixed industrial sector companies. The data of the research has been collected from the financial statements of the Industrial Banks of Iraq for the period 2007-2011, and by means of questionnaire distributed to a sample of the mixed industrial sector companies in
... Show MoreAbstract
The research aims to stand on the practice of operations management of solid waste in the city of Hilla, carried out by the mayor of Hilla Directorate - solid and the environment Waste Division, through field visits and personal interview to officials of the municipal departments and units of its data collection and information related to solid waste, and assess the current status of the processes of collection and transport waste through the questionnaire that had been prepared for citizens and employees, the search reach a set of conclusions was the most important, operations carried out by the municipality of Hilla Directorate only limited to two (collection, transportation and disposal of wa
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the
So I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi
The arise of Islam as a multidimensional changing phenomenon with its own revolutionary and comprehensive character was inherent with a lot of alterations in social aspects , and this is explicit particularly in the scope of urban life and town planning . Essentially, Islamic style of life has its own urban identity. The urbanization process in Islam has been developed across two integrated sides, the first one concerned on ideational and theoretical aspects , while the other associated with practice .Many urban centers emerged during the Islamic era since the erection of Basrah , the first Islamic town in the middle of the 7th. centaury. Some contemporary urban concepts , both environmental and social could be noticed in Islamic
... Show MoreThe focus of this paper is the presentation of a new type of mapping called projection Jungck zn- Suzuki generalized and also defining new algorithms of various types (one-step and two-step algorithms) (projection Jungck-normal N algorithm, projection Jungck-Picard algorithm, projection Jungck-Krasnoselskii algorithm, and projection Jungck-Thianwan algorithm). The convergence of these algorithms has been studied, and it was discovered that they all converge to a fixed point. Furthermore, using the previous three conditions for the lemma, we demonstrated that the difference between any two sequences is zero. These algorithms' stability was demonstrated using projection Jungck Suzuki generalized mapping. In contrast, the rate of convergenc
... Show MoreThe goal of this study was to investigate the protein peroxidation role by measuring serum levels of advanced oxidation protein products (AOPP) in type 2 diabetic patients with or without retinopathy and comparing them to controls to see if circulating AOPP levels can be used as a detection biomarker for DR. And see which of the two widely used antidiabetic treatment groups had the most impact on this oxidative stress marker. The groups were divided into two subgroups: 1) 70 type 2 diabetic patients (36 male, 34 female), 35 with diabetic retinopathy (DR) and 35 with no evidence of DR, and 2) non-diabetic controls (11 male, 9 female) were chosen from Ibn AL-Haitham Hospital for Ophthalmology and a Specialized Center for Endocrinology and Dia
... Show More