The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here in this research article, we present a comprehensive review of fog computing, differentiating it from cloud computing, also present various use-cases of fog computing in different domains, we came to conclude that Fog computing leads in an efficient energy resource management, leveraging the energy both in terms of consumption and cost scenarios. Further, we highlighted its key features, challenges and issues, resource optimization methods.
Background: The clinical examination is one of the best suitable methods for diagnosis of low backache. Backache is one disease that the signs, clinical examination finding, and the results on imaging modalities not always related. The straight leg raising (SLR) and slump tests, can be used for diagnosis of lumber disc herniation.
Objectives: To compare the result of the slump test and SLR test in the diagnosis of lumber disc herniation.
Subjects and Methods: A prospective comparative study conducts on 280 patients in Al-Kindy teaching and private clinics complaints of backache, aging between 18-70 years old with acute or recurrent backache, sciatica pai
... Show MoreAn analytical procedure has been carried out to measure the charge that may be trapped in an insulator sample of scanning electron microscope. It mainly concerns the determination of the deduced polarization charges by means of mirror effect phenomenon. Several relations related to such issue have been modified so as to be applicable for regarding charges due to polarization in linear and isotropic material. Consequently, the potential arises as a result for both trapped free and polarization charges which is set up. Actually the well-known magnification factor method is adopted to be a case study to implement the introduced approach. Results have clearly showed that the polarization charge significantly influences the Coul
... Show MoreThis research aims to studying and analyzing the theoretical
framework of the environmental auditing in industrial environment to its a broad and danger environmental effects . It aims to contribute in setting and testing a proposed procedure framework for environmental auditing in that vital activity .The practical aspect focused on testing a proposed framework within practice it in a one Iraqi industrial company that has a huge effect on environmental activity, represented by Iraqi state company
The political struggle being waged by Muslims today is one of the most important issues that have preoccupied the Arab and international media, and the failures that have afflicted Muslims in our contemporary world have negatively affected the younger generations and led them, and with the influence of anti-Islam media, to rely on accusing Islam as a religion with all the negative in Islamic and Arab society . So secularism took its role in spreading these concepts by deviating from its course from the concept of science to the concept of (the religion).
From here the calls for reform rose to return the Muslims to the incubator of Islam, so people turned around them, but they turned into competing Islamic polit
Crime has become a phenomenon associated with human socialization. Wherever human groups are found, a crime, which differs from one society to another, is found. It is one of the most dangerous social issues that undermines the solidarity of a given society. This is because it establishes a takeoff from community's norms, values, customs and traditions, and thus turns into a danger to the lives of people, groups and society that threatens its strength and security. The paper focuses on the crimes that violate the social law, like child rape, incest and electronic extortion, which are increasing in size, increasing as a result their repercussions on the human society. The study seeks several objectives, including: examining the natu
... Show MoreLaser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of arte
Objective: The approximate life span of a silicone maxillofacial prosthesis is as short as1.5–2 years of clinical service, then a new prosthesis should be fabricated. The most common reasonfor re-making the prosthesis is silicone mechanical properties degradation. The aim of this studywas to assess some mechanical properties of VST-30 silicone for maxillofacial prostheses after addi-tion of intrinsic pigments.Methods: Two types of intrinsic pigments (rayon flocking and burnt sienna); each of them wasincorporated into silicone. One hundred and twenty samples were prepared and split into 4 groupsaccording to the conducted tests (tear strength, hardness, surface roughness, and tensile strengthand elongation percentage) with 30 samples for ea
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show More