The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here in this research article, we present a comprehensive review of fog computing, differentiating it from cloud computing, also present various use-cases of fog computing in different domains, we came to conclude that Fog computing leads in an efficient energy resource management, leveraging the energy both in terms of consumption and cost scenarios. Further, we highlighted its key features, challenges and issues, resource optimization methods.
The current work aims to evaluate the association between genetic mutations in thymidylate synthetase (
In this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted in the theoretical cross section and compared with the experimental data for nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spi
... Show MoreThe research aims to shed light on the financing structure, which is one of the important pillars of financial management in the commercial banking sector, which enhances its financial position through financing its various investments, which is one of the pillars of the successful economy of the commercial banking sector. in which country. The contents of the research variables, which were represented by the independent variable, financing structure, the dependent variable, and investment decisions in commercial banks, which the researcher tried to address, as the research began with a basic variable that depends on diagnosing the impact of the financin
... Show MoreThe objective of this research is to develop a method for applying financial derivatives in the local environment to reduce the risk of foreign exchange rate fluctuations to enhance quality of accounting profits through Financial reporting to local units In accordance with international financial reporting standards, To accomplish this objective was selected a sample of Iraqi units exposed to the risk of fluctuations in foreign currency rates, As the research found:
- many companies and banks in the local environment a lot of losses due to fluctuations in foreign currency exchange rates.
- that financial derivatives in the Iraqi environment represent
EMS in accordance with ISO 14001: 2015 is considered an entry point to reduce environmental impacts, especially the effects resulting from the oil industry, which is the main source of environmental pollution and waste of natural resources, since the second revision of the standard took place in September 2015. The problem of the research was manifested in the weakness in understanding the correct guidelines that must be followed in order to obtain and maintain the standard. The purpose of this research was to give a general picture of what is behind ISO14001:2015 and how it is possible to create a comprehensive base for understanding its application by seeking the gap between the actually achieved reality, standards requirements
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreSummary
The subject ( meaning of added verbs) is one of the main subjects
which study in morphology since in Arabic language. It is include the meaning
of each format, and the increased meaning occurred by this increment in the
verbs.
The (strain) is one of very important meaning in this subject, it takes a
wide area of morphology studies, and interesting of scientists and
researchists.
There are two famous formats for this meaning; (infa la انفع
ل ), and (ifta
la افتع
ل ). Also There are another formats for the same meaning, but less than
the first two in use, they are; (taf ala تفعّ
ل ), (tafa ala تفاع
ل ), (taf lala ) ,(تفعل
ل
ifanlala افعنلل ), (ifanla .(
As cultures are mainly divided into collectivistic and individualistic, members tend to emphasize, through communication, either their position as part of their group or their independence from the group. This emphasis is manifested in using the pragmatic concepts of positive politeness and negative politeness. The present study looks into the reflection of these two cultures in Rockstar’s renowned video game, Red Dead Redemption 2 (2018). It aims at identifying the two cultures as present in the game and showing their significance to its narrative. It fills the gap in the studies of language used within video games as well as its cultural reflections. The study addresses the following question: What are the positive and negative
... Show MoreNonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.
We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas