Preferred Language
Articles
/
bsj-3479
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management
...Show More Authors

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here in this research article, we present a comprehensive review of fog computing, differentiating it from cloud computing, also present various use-cases of fog computing in different domains, we came to conclude that Fog computing leads in an efficient energy resource management, leveraging the energy both in terms of consumption and cost scenarios. Further, we highlighted its key features, challenges and issues, resource optimization methods.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 06 2004
Journal Name
Iraqi Journal Of Science
Cluster and factor analyses R and Q mode technique of geochemical and petrological data of the Shalair Metamorphic Rock Group, Shalair Valley area, Northeastern Iraq
...Show More Authors

Publication Date
Wed Mar 31 2021
Journal Name
Indones. J. Chem.,
Synthesis and DFT Study of the Complexation of Schiff Base Derived Curcumin and L-Tyrosine with Al(III), Ag(I), and Pb(II) Metal Ions
...Show More Authors

The multi-dentate Schiff base ligand (H2L), where H2L=2,2'-(((1,3,5,6)-1-(3-((l1-oxidaneyl)-l5-methyl)-4-hydroxyphenyl)-7-(4-hydroxy-3-methoxyphenyl)hepta-1,6-di ene-3,5-diylidene)bis(azaneylylidene))bis(3-(4-hydroxyphenyl)propanoic acid), has been prepared from curcumin and L- Tyrosine amino acid. The synthesized Schiff base ligand (H2L) and the second ligand 1,10-phenanthroline (phen) are used to prepare the new complexes [Al(L)(phen)]Cl, K[Ag(L)(phen)] and [Pb(L)(phen)]. The synthesized compounds are characterized by magnetic susceptibility measurements, micro elemental analysis (C.H.N), mass spectrometry, molar conductance, FT-infrared, UV-visible, atomic absorption (AA), 13C-NMR, and 1H-NMR spectral studies. The characterization of the

... Show More
Preview PDF
Publication Date
Tue Mar 25 2025
Journal Name
Indonesian Journal Of Chemistry
Synthesis, Characterization, and Antioxidant Activity of Cr(III), Mn(II), Fe(III), Co(II) and Ni(II) Complexes with Mixed Azo Dye and Bipyridyl Ligands
...Show More Authors

Mixed ligands reaction of [2-[(3-hydroxyphenyl)diazinyl]-1,2-benzothiazol-3(2H)-one-1,1-dioxide] (H2L, primary ligand) and bipyridyl (secondary ligand) with salts of Cr(III), Mn(II), Fe(III), Co(II) and Ni(II) was performed. A series of air-stable complexes with distinctive octahedral moieties was created by equal molar ratio (1:1:1). The formation of these compounds was verified using detecting analysis techniques incorporating mass spectra, which validated the achieved geometries. Fourier transform infrared (FTIR) analysis demonstrated how the ligands (H2L and bipyridyl) are chelated as tridentate (ONO) and bidentate (NN) groups, respectively and the coordination with the metal ions. Thermal decomposition studies using pyrolysis (

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jul 19 2024
Journal Name
Baghdad Science Journal
Synthesis, Characterization, and Thermal Studying of VO(II), Cu(II), Zn (II), Cd(II), and Au (III) Complexes with Azo Dye and Evaluation as Antioxidants
...Show More Authors

حضرت معقدات كل من الفنادايل, الخارصين, النحاس والكادميوم بتكافؤهم الثنائي والذهب بتكافؤه الثلاثي بأستخدام صبغة ازوجديدة (6،4،2-ثلاثي هيدروكسي-3-((3-هيدروكسي فنيل) ثنائي زينيل ) فنيل ) ايثان-1-اون المحضرة من ملح الديازونيوم مع ٦,٤,٢- ثلاثي هيدروكسي اسيتوفينون بعد عزل (E)-1-(2,4,6-trihydroxy-3-((3-hydroxyphenyl)diazenyl)phenyl)ethan-1-one تم تشخيصها بواسطة الطرق الطيفية المتاحة  والتقنيات التشخيصية لكل من التحليل الدقيق للعناصرواطياف كل من ال

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Biotechnology
Association among family history and some microbial infectious ( Helicobacter pylori IgG and Hepatitis B and C Virus) as Risk Factors for Atherosclerosis in Iraqi Patients
...Show More Authors

Certain bacterial and viral infectious agents may play a role in the activation of inflammation in atherosclerosis lesions. Epidemiological studies indicate that infectious agents may predispose patients to atherosclerosis as Infections have been associated with an increased risk of this disease. Moreover, a positive antibody status has been detected against some infectious organisms associated with atherosclerotic rupture. Infectious agents found in human atheroma, which may directly cause or accelerate atherosclerosis , include many pathogens but the present study focused on Helicobacter pylori, hepatitis B virus surface antigen and C. In order to evaluate the possible association between H. pylori, HBV, and HCV infections and the risk of

... Show More
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
The approach of Al-Hafiz Ibn Al-Malqin, in his followings on the Nisaburi ruler, through the book Al-Badr Al-Munir in the graduation of hadiths of the great commentary
...Show More Authors

Praise be to God, Lord of the worlds, and peace and blessings be upon our master Muhammad and his family and companions as follows:
   For God Almighty has swapped for every age a group of religious scholars who give news to the narrators, so that they can lie against the Sunnah of the Mustafa, who is among those who memorized Ibn Al-Mulqin, as he followed the ruler in his book Al-Badr Al-Munir in the Hadith of Al-Sharh Al-Kabeer, and our research included two topics, which we explained in the first topic: The sequels in which the teacher's son Al-Malqin disagreed, and we discussed in the second topic: the followings in which Ibn Al-Malqin agreed to rule.
   This research included important results, th

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Applying the Percentage of Complete Method or the Complete Contract One on the Taxation of the Long – Term Construction Contracts: بحث تطبيقي في الهيئة العامة للضرائب – قسم الشركات
...Show More Authors

The research aims to shed light on the amount of proceeds annual tax for each of the way the contract total and percentage of completion method - see which is better - as well as the current problems arising from the application method of the contract in full in settling accounts tax - to identify problems - related to postpone settling accounts tax in accordance with the way the contract fully and determine the advantages and disadvantages of each of the methods through practical application , and then use the results as inputs to help in the decision to confirm the continuation of the GCT using a full decade in settling accounts tax for long-term construction contracts or forgo them.

Were the result of research the existence of

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Phyton
Toxic and Antifeedant Effects of Different Pesticidal Plant Extracts against Beet Armyworm (<i>Spodoptera exigua</i>)
...Show More Authors

The beet armyworm (BAW), Spodoptera exigua (Lepidoptera: Noctuidae) is a highly destructive pest of vegetables and field crops. Management of beet armyworm primarily relies on synthetic pesticides, which is threatening the beneficial community and environment. Most importantly, the BAW developed resistance to synthetic pesticides with making it difficult to manage. Therefore, alternative and environment-friendly pest management tactics are urgently required. The use of pesticidal plant extracts provides an effective way for a sustainable pest management program. To evaluate the use of pesticidal plant extracts against BAW, we selected six plant species (Lantana camara, Aloe vera, Azadirachta indica, Cymbopogon citratus, Nicotiana tabacum ,

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
MEASUREMENT OF CHEMICAL AND PHYSICAL PROPERTIES IN SOME MINERAL WATER SAMPLES FILLED IN THE MARKETS OF THE PROVINCE OF NAJAF AND COMPARE WITH THE IRAQI AND INTERNATIONAL RATIOS.: MEASUREMENT OF CHEMICAL AND PHYSICAL PROPERTIES IN SOME MINERAL WATER SAMPLES FILLED IN THE MARKETS OF THE PROVINCE OF NAJAF AND COMPARE WITH THE IRAQI AND INTERNATIONAL RATIOS.
...Show More Authors

In this research, a selection of some mineral water was selected on the basis of being the most marketed by the owners of shops in Najaf province, with six types, where daily samples of this water were taken by 50 ml for two months from (1/11/2018 -1/1/2019). The following ions concentrations were measured (Br-, Cl-, F-, NO3-, SO42-, Na+, K+, Ca2+, Mg2+), pH and the electrical conductivity were measured and the results were compared with the allowable rates according to the international organizations. It was noted that they conform to international and Iraqi standards.

View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref