Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained analytical graphs are discussed thoroughly, and apparently, the proposed CFSS algorithm outperformed another existing algorithm with a 10.47% improvement in average response time for multiple jobs per round.
Throughput accounting is concerned with a throughput measurement process to determine the efficiency of the company, to know the problems and obstacles it suffers from, to determine their causes and ways to address them.The research problem is represented by the following question: does the application of a throughput accounting lead to maximizing the company's profits? The aim of the research is to demonstrate the importance of throughput accounting, which is one of the tools of management accounting in providing an efficient information system that provides the company’s management with the information it needs to improve its production processes, increase a throughput, and thus maxi
... Show MoreThe aim of this research is to measure the effect of Adey- Shire model in the achievement and critical thinking of first intermediate female students in mathematics. The researcher adopted the experimental method with a post-test, the research of sample consists of (60) female students, divided into two groups with (30) students in the experimental group, that studied with Adey- Shire model, and (30) students in the control group who studied in the usual way. The two groups are equivalent in many variables. The researcher makes two tests of multiple choices, the first one is an achievement test consists (30) items and another test was for a critical thinking test with (25) items. The statistical analysis make to both tests is made with s
... Show MoreThat internal control is particularly important in improvingperformance and tax reform، they play an important role in the regularity ofwork and development and the anti corruption and activating the decisionsand tax legislation، as contained in the organizational plan and the means،procedures and components designed from which to ensure a policy andimplementation plans The research aims to review the reality of the internalcontrol in the General Commission for Taxes and stand on the deficiencies init, with the strengthening of the role of internal control in the GeneralAuthority for taxes based on the laws and regulations and by using modernmeans to work as well as developing the performance of employees in thebody، including helpin
... Show MoreResearch summary
Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreArab heritage have teem much of the literature value, written by evacuated, who had a legacy of linguistic great scientists, but the circumstances are unknown, did not write those books or authors emerge, chose to search for a book of those compositions, he did not write to him and his book emerge, fell hands a book (Altvsh in the language) to Abu Sufyan grammar, a fourth-century scientists, as it is Abu Sufyan grammar of scientists who rolled up the time their impact, and the cryptic revelations among the stars, preferring to stand on this book and its author, a statement of the most important grammatical aspects contained therein; to notch the curtain for this world, and his book (Altvsh in strewn language and Mnzawmha and express the
... Show MoreThere are many applied Economic studies that have found positive nexus between financial development and poverty reduction in developing countries. Iraq has witnessed an increasing rate of poverty during the period 1980-2010 due to many internal and external factors such as wars, economic sanctions, inflation, a high rate of unemployment, and political and security instability. Therefore, the investigation about the solutions to reduce poverty becomes very necessary, and enhancing the financial development in Iraq is one of these options. This is due to that the financial development could reduce the poverty rates through two channels: the first is direct via the offering of the loans and other financial facilities to the poor, a
... Show MoreIn this article, the partially ordered relation is constructed in geodesic spaces by betweeness property, A monotone sequence is generated in the domain of monotone inward mapping, a monotone inward contraction mapping is a monotone Caristi inward mapping is proved, the general fixed points for such mapping is discussed and A mutlivalued version of these results is also introduced.
If the State attaches great importance to its foreign relations and intends to strengthen them in order to ensure the achievement of the highest national goals and interests. External relations between countries are one of the most prominent features of foreign policy, which depends on a combination of internal and external factors, the modern relations between Tunisia and Tunisia, which goes back to the pre-independence of Tunisia, when Iraq was a supporter of Tunisia's independence from France in the 1940s, Although these relations did not cause any disturbance by the two countries, but they remained weak relations did not develop in all areas except the sports and cultural field, which we will determine the reasons and the pos
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show More