Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained analytical graphs are discussed thoroughly, and apparently, the proposed CFSS algorithm outperformed another existing algorithm with a 10.47% improvement in average response time for multiple jobs per round.
Evaluation is one of the most important elements of teaching process. The recent trends in evaluation and educational reform movements have called for using alternative evaluation, which focuses on performance evaluation. Authentic assessment is usually described as formative, in which students participate in their acquisition, in addition to the fact that students are productive and active, which is reflected in the students' achievement and skill level. The study aims to reveal the degree of knowledge and use of alternative assessment tools by primary school teachers in Gaza -Palestine. To meet the objective of the study, the researchers used the descriptive-analytical method and the questioner as a study tool. The study sample c
... Show MoreThe increasing rates of consumption of cigarettes harmful, to health in the world in general, and in Iraq in particular, and because of the costs borne by individuals, and the state as a result of addressing its damage, as well as Iraq's commitment, to international conventions against cigarettes, and demands of the World Health Organization, to raise prices to reduce consumption. Therefore, the tax Selectivity is one of the most important ways of regulating the consumption of this commodity on the one hand and increasing the tax revenue on the other. The research aims to shed light on the issue of selective tax on cigarettes and the impact of their application in increasing tax revenues and identify the effectiveness of the application
... Show Moreتحضيروتشخيص ودراسة طيفية وحرارية وبيولوجية للمركب الجديد والمشتق من 2-امينوبينزوثايوزول واستخدامه كمثبط لتأكل سبيكة (-brass) في أنابيب مياه الشرب مع بعض المعقدات الفلزية
استخلص عامل التلزن من E. faecalis EM1 بعد تكسير الخلايا بعدة طرق واختيار الطريقة التي تعطي اعلى قيمة تلزن والترسيب بالكحول الاثيلي , واجري فحص التلزن وقياسه للمستخلص مع انواع من البكتريا السالبة لملون غرام تضمنت Escherichia coli و Klebsiella pneumoniae و Serratia
Islamic manuscripts are considered an identity for the civilizational, cognitive and cultural development of nations and the Islamic world as a whole, and to identify this identity
The scholars of Iraq in the modern and contemporary era have been interested in the definition of tremendous knowledge treasures left by the successive Iraqi civilizations on Mesopotamia and around the cities, through the census and extrapolation of manuscript heritage and even printed, they compiled indexes,evidence
Islamic manuscripts are considered an identity for the civilizational, cognitive and cultural development of nations and the Islamic world as a whole, and to identify this identity, the closing statement usually written at the end of the manuscript helps us with this, meaning that the closing entries serve as the identity document of the manuscript
Abstract
The Phenomenon of Extremism of Values (Maximum or Rare Value) an important phenomenon is the use of two techniques of sampling techniques to deal with this Extremism: the technique of the peak sample and the maximum annual sampling technique (AM) (Extreme values, Gumbel) for sample (AM) and (general Pareto, exponential) distribution of the POT sample. The cross-entropy algorithm was applied in two of its methods to the first estimate using the statistical order and the second using the statistical order and likelihood ratio. The third method is proposed by the researcher. The MSE comparison coefficient of the estimated parameters and the probability density function for each of the distributions were
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More