The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here in this research article, we present a comprehensive review of fog computing, differentiating it from cloud computing, also present various use-cases of fog computing in different domains, we came to conclude that Fog computing leads in an efficient energy resource management, leveraging the energy both in terms of consumption and cost scenarios. Further, we highlighted its key features, challenges and issues, resource optimization methods.
The aim of the present work to study the effect of changing velocity (Reynold's number) on oxygen cathodic polarization using brass rotating cylinder electrode in 0.1, 0.3 and 0.5N NaCl solutions (PH = 7) at temperatures 40, 50 and 600 C. Cathodic polarization experiments were conducted as a function of electrode rotational speed and concentration.
An edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreSemiconductor-based metal oxide gas detector of five mixed from zinc chloride Z and tin chloride S salts Z:S ratio 0, 25, 50, 75 and 100% were fabricated on glass substrate by a spray pyrolysis technique. With thickness were about 0.2 ±0.05 μm using water soluble as precursors at a glass substrate temperature 500 ºC±5, 0.05 M, and their gas sensing properties toward CH4, LPG and H2S gas at different concentration (10, 100, 1000 ppm) in air were investigated at room temperature which related with the petroleum refining industry.
Furthermore structural and morphology properties were scrutinize. Results shows that the mixing ratio affect the composition of formative oxides were (ZnO, Zn2SnO4, Zn2SnO4+ZnSnO3, ZnSnO3, SnO2) ratios ment
The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreCarbon nanoparticles are prepared by sonication using carbon black powder. The surface morphology of carbon black (CB) and carbon nanoparticles (CNPs) is investigated using scanning electron microscopy (SEM). The particles size ranges from 100 nm to 400 nm for CB and from 10 nm to 100 nm for CNPs. CNPs and CB are mixed with silicon glue of different ratios of 0.025, 0.2, 0.05, and 0.1 to synthesis films. The optical properties of the prepared films are investigated through reflectance and absorbance analyses. The ratio of 0.05 for CNPs and CB is the best for solar paint because of its higher solar water heater efficiency and is then added to the silicon glue . Temperature of cold water and temperature of hot water in storage tank were ta
... Show MoreThe objective of the present study is to determine the effect of Kaolin as a fuel oil additive to minimize the fireside corrosion of superheater boiler tubes of ASTM designation (A213-T22) by increasing the melting point of the formed slag on the outside tubes surface, through the formation of new compounds with protective properties to the metal surface. The study included measuring corrosion rates at different temperatures with and without additive use with various periods of time, through crucible test method and weight loss technique.
A mathematical model represents the relation between corrosion rate and the studied variables, is obtained using statistical regression analysis. Using this model,
... Show MoreHealth and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe workin
... Show MoreThis study seeks to identify the role that the leadership trend plays in the management of health institutions in Iraq and its impact on improving the quality of the health service provided by analyzing some opinions of affiliates working in the Iraqi health sector where a survey list was used as a main tool for collecting primary data, as it was subjected to this analysis ( 60) of the medical staff, of whom (40) are doctors and (20) are affiliated with the rank of assistant physician, and (60) members of the administrative cadre have undergone their various job ranks and administrative specializations (department manager, auditor, observer, accountant, statistician, secretary). Reliance on statistical software (spss) in data ana
... Show More