Preferred Language
Articles
/
bsj-5268
Conceptual Service Level Agreement Mechanism to Minimize the SLA Violation with SLA Negotiation Process in Cloud Computing Environment
...Show More Authors

Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this research article, a toolbox is proposed to help the procedure of exchanging of a SLA with the service providers that will enable the cloud client in indicating service quality demands and an algorithm as well as Negotiation model is also proposed to negotiate the request with the service providers to produce a better agreement between service provider and cloud service consumer. Subsequently, the discussed framework can reduce SLA violations as well as negotiation disappointments and have expanded cost-adequacy. Moreover, the suggested SLA toolkit is additionally productive to clients so clients can secure a sensible value repayment for diminished QoS or conceding time. This research shows the assurance level in the cloud service providers can be kept up by as yet conveying the services with no interruption from the client's perspective

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Measuring Positive and Negative Association of Apriori Algorithm with Cosine Correlation Analysis
...Show More Authors

This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrolytic preparation of Iron powder with particle Size Less than 106 pm
...Show More Authors

Avery large numbers of articles are made by powder metallurgical methods using electrolytically reduced metal powders. Iron powder is one of these powders which play an important role in this field. Its preparation by electrolytic method is economic in comparison with the traditional methods (Atomization and carbonyl processes).

An electrochemical cell consisting of two electrodes (stainless steel cathode and iron anode, 99.9%) was used to study the electrolytic preparation of iron powder with particle size less than 106µm directly as powde1y form. Ferrous sulphate electrolyte was used containing sodium chloride as a stabilizing agent. The produced powder was thoroughly washed with an acidified distilled water and absolute ethan

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Effective dialogue and its relationship with some variables at Baghdad University Students
...Show More Authors

     Increasing need for our youth to effective dialogue at the present time, due to the nature of the era in which live, as it abounded risk of intellectual and cultural invasion.Moreover, the need to ensure that the dialogue between the members of the community to confront the many issues of contemporary society in various fields, politically, socially and economically, culturally and religiouslyThe absence of effective dialogue, or the consequent rejection of many of the negative aspects of social and cultural Kaezzlh coup and inertia and ignore the mental capacity of some non-existent among others.The importance of effective dialogue in being the most important foundations of social life a

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Synthesis of New Derivatives of Cephalexin with Isatin and Glycine Schiff Bases
...Show More Authors

Objectives: Two derivatives of cephalexin were synthesized by reaction with isatin-glycine Schiff base and bromoisatin-glycine Schiff base separately. Methods: Cephalexin was linked through the amine group to isatin glycine and bromoisatin glycine Schiff bases by amide bond formation. Results: These derivatives were characterized by FT-IR, H-NMR, elemental CHN analysis and then tested for their antimicrobial activity compared to cephalexin against gram-positive, gram-negative bacteria and Candida albicans fungi. Conclusion: The two compounds showed better activity against Staphylococcus aureus, compound 3b is more active against Escherichia coli, and compound 3a is more active against Klebsiella pneumonia.

Scopus (1)
Scopus
Publication Date
Wed Oct 09 2019
Journal Name
Engineering, Technology & Applied Science Research
Serviceability of Reinforced Concrete Gable Roof Beams with Openings under Static Loads
...Show More Authors

This paper presents an analytical study on the serviceability of reinforced concrete gable roof beams with openings of different sizes, based on an experimental study which includes 13 concrete gable roof beams with openings under static loading. For deflection and crack widths under static loading at service stage, a developed unified calculation procedure has been submitted, which includes prismatic beams with one opening subjected to flexure concentrated force. The deflection has been calculated with two methods: the first method calculated deflections via relevant equations and the second was Direct Stiffness Method in which the beam is treated as a structural member with several segments constituting the portions with solid sec

... Show More
View Publication Preview PDF
Crossref (17)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Structural performance of fiber-reinforced lightweight concrete slabs with expanded clay aggregate
...Show More Authors

Crossref (4)
Crossref
Publication Date
Sun Aug 18 2019
Journal Name
Proceedings Of Mechanical Engineering Research Day 2019,
Study of sound absorption of micro perforated panel with visco-thermal effects
...Show More Authors

Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Phenol from Water and Wastewater by Chemical Precipitation with Lime
...Show More Authors

View Publication Preview PDF
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Fingerprints Identification and Verification Based on Local Density Distribution with Rotation Compensation
...Show More Authors

The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors