Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this research article, a toolbox is proposed to help the procedure of exchanging of a SLA with the service providers that will enable the cloud client in indicating service quality demands and an algorithm as well as Negotiation model is also proposed to negotiate the request with the service providers to produce a better agreement between service provider and cloud service consumer. Subsequently, the discussed framework can reduce SLA violations as well as negotiation disappointments and have expanded cost-adequacy. Moreover, the suggested SLA toolkit is additionally productive to clients so clients can secure a sensible value repayment for diminished QoS or conceding time. This research shows the assurance level in the cloud service providers can be kept up by as yet conveying the services with no interruption from the client's perspective
ي لا ماق ثحبلا فادهأ قيقحتلو ثحبلا ةنيعل نايبتسا ءارجاو فراصملل ةيلاملا مئاوقلا ليلحتب ثحاب اهمهأ ناك تاجاتنتسا ىلإ ثحابلا لصوت دقو لإ صاخ معد دوجو مدع نم ةيفرصملا رطاخملا ةراد ةروصب اهدوجو مدعو فراصملل ةماعلا تارادلاا يف اهدوجو رصتقي ثيح ،ايلعلا تاهجلا لبق نم ديزي امم ،عورفلا يف ةلاعف مدع ةجيتن عورفلا نم ةدلوتملاو فراصملا اههجاوت يتلا رطاخملا اهمهأ ناك تايصوت ىلإ ثحابلا لصوت دقو امك ،ةيفرصملا تلاماعم
... Show MoreCoronavirus disease (COVID-19) is an acute disease that affects the respiratory system which initially appeared in Wuhan, China. In Feb 2019 the sickness began to spread swiftly throughout the entire planet, causing significant health, social, and economic problems. Time series is an important statistical method used to study and analyze a particular phenomenon, identify its pattern and factors, and use it to predict future values. The main focus of the research is to shed light on the study of SARIMA, NARNN, and hybrid models, expecting that the series comprises both linear and non-linear compounds, and that the ARIMA model can deal with the linear component and the NARNN model can deal with the non-linear component. The models
... Show MoreType 1 diabetes mellitus (T1DM) is an autoimmune disease frequently associated with autoimmune thyroid disease (AITD). The study is conducted at the Specialized Center for Endocrinology and Diabetes-Baghdad at Al-karkh side, during December 2013 up to April 2014. In this study, we investigate the prevalence of anti-thyroid peroxidase (anti-TPO) antibody in(80) type1 diabetic patients with (AITD) and (30) healthy controls .Blood samples are taken for investigation of thyroid tests by using Vitek Immunodiagnstic Assay System (VIDAS).Enzeme Linked Immunosorbent Assay (ELISA) is used to detect anti-thyroid antibody(anti-TPO). The results show that age, gender and BMI (body mass index) are similar in both groups, p>0.05. Among 80 type1 diabetic
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More<p>In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz
... Show MoreFibroblast growth factors-23 (FGF-23) are a class of cell signaling proteins produced by macrophages. They have a range of roles, but they play a particularly important role in the development of animal cells, where they are essential for appropriate growth. Phosphate, which is found in the body as both organic and mineral phosphate, plays crucial roles in cell structure, communication, and metabolism. Most phosphate in the body resides in bone, teeth, and inside cells, with less than 1% circulating in serum. The aim of the study is to evaluate the levels of the Fibroblast Growth Factors-23 and phosphate and receiver operating characteristic (ROC) in acromegaly patients against healthy control. A case control study Fibroblast Growth Fact
... Show MoreThe research aims to evaluate Islamic electronic libraries and their service for downloading research and illustrated books, explaining their origins, features and types. The research was limited to the libraries available on the Internet that provide the service for downloading research and illustrated books. The researcher relied on the survey approach to identify the libraries and a sample of them (20 libraries) was selected. For the purpose of evaluating it according to five criteria related to the preparation and publication of Islamic electronic libraries (the responsible party, the goals and objectives, the year, the services it provides, the sections and subject specializations of its contents) and five criteria related to the servi
... Show MoreIn this work, the effect of vortex shedding on the solar collector performance of the parabolic trough solar collector (PTSC) was estimated experimentally. The effect of structure oscillations due to wind vortex shedding on solar collector performance degradation was estimated. The performance of PTSC is evaluated by using the useful heat gain and the thermal instantaneous efficiency. Experimental work to simulate the vortex shedding excitation was done. The useful heat gain and the thermal efficiency of the parabolic trough collector were calculated from experimental measurements with and without vortex loading. The prototype of the collector was fabricated for this purpose. The effect of vortex shedding at different operation condition
... Show MoreDiversity has become one of the required phenomena to be available within public organizations, in light of the changes taking place in the global and international environment and in various fields. Therefore, it was imperative to study the impact of this phenomenon in various institutions, especially public ones, in most developing countries, including Iraq. The current research aims to analyze the relationship between The demographic diversity and institutional effectiveness of a sample of workers in public institutions included (500) respondents. The questionnaires were distributed to them randomly. Diversity is considered an independent variable and institutional effectiveness a dependent variable. The researcher used interview tools a
... Show More