Preferred Language
Articles
/
bsj-3189
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual resource, by combining two types of algorithms: dynamic algorithm (adaptive firefly) and static algorithm (weighted round robin). The results show improvement in resource utilization, increased productivity, and reduced response time.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 01 2020
Journal Name
مجلة بحوث الشرق الأوسط
دراسة مقارنة لمستوى التمکین الإداری بین مشرفی التربیة الریاضیة (الاختصاص والفنی) لمدیریات التربیة فی محافظة بغداد A Comparative Study of the Level of Administrative Empowerment between the Physical Education Supervisors (Specialization and Technical) of Education Directorate in Baghdad Governorate
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 19 2024
Journal Name
Journal Of Metastable And Nanocrystalline Materials
The Structural, Magnetic, and Electrochemical Properties of Composite PAni/Co<sub>0.2</sub>Mn<sub>0.8</sub>Fe<sub>2</sub>O<sub>4</sub>
...Show More Authors

The current work concerns preparing cobalt manganese ferrite (Co0.2Mn0.8Fe2O4) and decorating it with polyaniline (PAni) for supercapacitor applications. The X-ray diffraction findings (XRD) manifested a broad peak of PAni and a cubic structure of cobalt manganese ferrite with crystal sizes between 21 nm. The pictures were taken with a field emission scanning electron microscope (FE-SEM), which evidenced that the PAni has nanofibers (NFs) structures, grain size 33 – 55 nm, according to the method of preparation, where the hydrothermal method was used. The magnetic measurements (VSM) that were conducted at room temperature showed that the samples had definite magnetic properties. Additionally, it was noted that the saturation magnetizatio

... Show More
View Publication
Crossref
Publication Date
Sat Sep 25 2021
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Characterization Of Some Metal Complexes With 3-(Benzo[d]Thaizole-2-Yl)-9-Oxo-6,7,7a,9-Tertrahydro-2H-2,10:4,7-Diepoxyfuro [3,2-f][1,5,3] Dioxazonine–2,4 (3H)–Dicarboxylic Acid. Hydro-chloride (L–as–am) and Study their Biological Activity
...Show More Authors

The reaction of 2-amino-benzothiazole with bis [O,O-2,3,O,O – 5,6 – (chloro(carboxylic) methiylidene) ] – L – ascorbic acid (L-AsCl2) gave new product 3-(Benzo[d]Thaizole-2-Yl) – 9-Oxo-6,7,7a,9-Tertrahydro-2H-2,10:4,7-Diepoxyfuro [3,2-f][1,5,3] Dioxazonine – 2,4 (3H) – Dicarboxylic Acid, Hydro-chloride (L-as-am)), which has been insulated and identified by (C, H, N) elemental microanalysis (Ft-IR),(U.v–vis), mass spectroscopy and H-NMR techniques. The (L-as am) ligand complexes were obtained by the reaction of (L-as-am) with [M(II) = Co,Ni,Cu, and Zn] metal ions. The synthesized complexes are characterized by Uv–Visible (Ft –IR), mass spectroscopy molar ratio, molar conductivity, and Magnetic susceptibility techniques. (

... Show More
Publication Date
Tue Dec 05 2023
Journal Name
Engineering, Technology & Applied Science Research
Theoretical Analysis of Composite RC Beams with Pultruded GFRP Beams subjected to Impact Loading
...Show More Authors

Glass Fiber Reinforced Polymer (GFRP) beams have gained attention due to their promising mechanical properties and potential for structural applications. Combining GFRP core and encasing materials creates a composite beam with superior mechanical properties. This paper describes the testing encased GFRP beams as composite Reinforced Concrete (RC) beams under low-velocity impact load. Theoretical analysis was used with practical results to simulate the tested beams' behavior and predict the generated energies during the impact loading. The impact response was investigated using repeated drops of 42.5 kg falling mass from various heights. An analysis was performed using accelerometer readings to calculate the generalized inertial load. The in

... Show More
View Publication
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Performance of Self-Compacting Concrete Slab with Grinded Local Rocks
...Show More Authors

The effect of using grinded rocks of (quartzite and porcelanite) as powder of (10 and 20) % replacement by weight of cement for self-compacting concrete slabs was investigated in this study. Five slabs with 15 concrete cubes were tested experimentally at 28 days to study the compressive strength, ultimate load, ultimate deflection, ductility, crack load and steel strain. The test results show that, the compressive strength improvement when replacement of local rock powder reached to (7.3, 4.22) % for (10 and 20) % quartzite powder and (11.3, 16.1) % for (10 and 20) % porcelanite powder, respectively compared to the reference specimen. The ultimate load percentage increase for slabs with (10 and 20) % rep

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 30 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancement of Uniformity of Solid Particles in Spouted Bed Using Stochastic Optimization
...Show More Authors

Performance of gas-solid spouted bed benefit from solids uniformity structure (UI).Therefore, the focus of this work is to maximize UI across the bed based on process variables. Hence, UI is to be considered as the objective of the optimization process .Three selected process variables are affecting the objective function. These decision variables are: gas velocity, particle density and particle diameter. Steady-state solids concentration measurements were carried out in a narrow 3-inch cylindrical spouted bed made of Plexiglas that used 60° conical shape base. Radial concentration of particles (glass and steel beads) at various bed heights and different flow patterns were measured using sophisticated optical probes. Stochastic Genetic

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 19 2017
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Reaction Kinetic of Al- Doura Heavy Naphtha Reforming Process Using Genetic Algorithm
...Show More Authors

In this study, genetic algorithm was used to predict the reaction kinetics of Iraqi heavy naphtha catalytic reforming process located in Al-Doura refinery in Baghdad.  One-dimensional steady state model was derived to describe commercial catalytic reforming unit consisting of four catalytic reforming reactors in series process.

The experimental information (Reformate composition and output temperature) for each four reactors collected at different operating conditions was used to predict the parameters of the proposed kinetic model. The kinetic model involving 24 components, 1 to 11 carbon atoms for paraffins and 6 to 11 carbon atom for naphthenes and aromatics with 71 reactions. The pre-exponential Arrhenius constants and a

... Show More
View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Securing Data in Wireless Body Area Network Using Hyper-Chaotic Zhou System
...Show More Authors

  E-Health care system is one of the great technology enhancements via using medical devices through sensors worn or implanted in the patient's body. Wireless Body Area Network (WBAN) offers astonishing help through wireless transmission of patient's data using agreed distance in which it keeps patient's status always controlled by regular transmitting of vital data indications to the receiver. Security and privacy is a major concern in terms of data sent from WBAN and biological sensors. Several algorithms have been proposed through many hypotheses in order to find optimum solutions. In this paper, an encrypting algorithm has been proposed via using hyper-chaotic Zhou system where it provides high security, privacy, efficiency and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref