Preferred Language
Articles
/
bsj-3189
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual resource, by combining two types of algorithms: dynamic algorithm (adaptive firefly) and static algorithm (weighted round robin). The results show improvement in resource utilization, increased productivity, and reduced response time.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 31 2023
Journal Name
College Of Islamic Sciences
The fatwa based on the statement of Zafar In the Hanafi school of thought
...Show More Authors

Each school of Islamic jurisprudence has principles and rules upon which the diligent work in these schools is based. This is due to the view of sanctification of these rulings, as they are divine rulings. Therefore, the goal is to reach a ruling that represents the intent of the legislator as much as possible.
Hence, these schools of thought established rules for issuing fatwas with the intention of restricting the performance of a fatwa to the hands of those who are qualified for it and have met its conditions, so they gave priority to the most knowledgeable person over others to perform the fatwa. In the Hanafi school of thought, for example, the saying of Imam Abu Hanifa (may God have mercy on him) is given precedence over others,

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Weighted Residual Method for the System of Nonlinear Volterra Integral Equations of the Second Kind Using an Exponential Function
...Show More Authors

The numerical resolve nonlinear system of Volterra integral equation of the second kind (NLSVIEK2) has been considered. The exponential function is used as the base function of the collocation method to approximate the resolve of the problem. Arithmetic epitome are performed which have already been solved by weighted residual manner,  Taylor manner and block- by- block(2, 3, 5).

View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
...Show More Authors

This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Process Safety And Environmental Protection
Applications of advanced oxidation processes (Electro‑Fenton and sono‑electro‑Fenton) for COD removal from hospital wastewater: Optimization using response surface methodology
...Show More Authors

View Publication
Scopus (19)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref
Publication Date
Mon Apr 05 2021
Journal Name
Solid State Technology
Genetic Algorithms in Construction Project Management: A Review
...Show More Authors

Genetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problem

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Convergence of Iterative Algorithms in Cat(0) Spaces
...Show More Authors

     In this article, results have been shown via using a general quasi contraction multi-valued mapping in Cat(0) space. These results are used to prove the convergence of two iteration algorithms to a fixed point and the equivalence of convergence. We also demonstrate an appropriate conditions to ensure that one is faster than others.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Civil Engineering Journal
Structural Behavior of BubbleDeck Slab under Uniformly Distributed Load
...Show More Authors

In structural construction fields, reducing the overall self-weight of the structure is considered a primary objective and substantial challenge in the civil engineering field, particularly in earthquake-affected buildings and tall buildings. Different techniques were implemented to attain this goal; one of them is setting voids in a specific position through the structure, just like a voided slab or BubbleDeck slab. The main objective of this research is to study the structural behavior of BubbleDeck reinforced concrete slabs under the effect of static uniformly distributed load. The experimental program involved testing five fixed-end supported two-way solid and BubbleDeck slabs of dimensions 2500×2500×200 mm. The considered par

... Show More
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref